Analysis
-
max time kernel
11s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 06:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1PE2LkN3kYwGYI-Nx6bcBC75zG_wZ97yu/view?usp=drive_link
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1PE2LkN3kYwGYI-Nx6bcBC75zG_wZ97yu/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 drive.google.com 7 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680058263594447" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4912 3200 chrome.exe 85 PID 3200 wrote to memory of 4912 3200 chrome.exe 85 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1144 3200 chrome.exe 86 PID 3200 wrote to memory of 1288 3200 chrome.exe 87 PID 3200 wrote to memory of 1288 3200 chrome.exe 87 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88 PID 3200 wrote to memory of 2124 3200 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1PE2LkN3kYwGYI-Nx6bcBC75zG_wZ97yu/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffeb26cc40,0x7fffeb26cc4c,0x7fffeb26cc582⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,9174401098397521440,18182888262034910857,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5844dbd7848538b33d009a21cc0eca194
SHA15b4452d337c51750d47f9617d33481b3aa20b6f1
SHA2565aeb3ad4894a4cfb3220ef2f405fc741ee636e89c55841b16d540790c1cd67b4
SHA5122ddf34d965f291478c307b870f6b62814b35492d08504c22bb46211198fa20392966ae9492a2b12d733dac90146420b6e3ddeb861b90568055f0c8564aab2af6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51435541c5bde34ceaea1b2b73c5b0e3d
SHA1b048319621746ac20681f842208f43a485b24371
SHA256d93f344f2a2bb1c7e4ec736092a910829b7c3ad3e2921364ff9259eb709b8a74
SHA5127157ecaebe8f5bbdf6374e5f9fc7324a049204c5d9caef31e676763c59aa36aac7d0ac0a51a971aa316fbb5fbc0e443e25d9b95d82ae64f26404ef7c2329ebb9
-
Filesize
9KB
MD57ffd38155afe9abe8bf9ccd8e0dc1f9d
SHA1954888b044e9ebb2307c2cae299e6ac4e47477fb
SHA256cba1bc3e7f6588122ca0101c32abc102514039b064fe7ee3e0694fb15764054b
SHA512a560b28b2b9014b458a142b2e4547963c1d14f4d7c7162103805dd9203bb3b51e17a3d6ca5cc3311c435a34023678c59a205fb72aba8b42765c732ff00760260
-
Filesize
99KB
MD52bfd7054651f3f7233ffa8561b7f4eb4
SHA12a930acf2495e0af56bbd9f18b1141826d4f517c
SHA2566c926adc3496113fc8b0e120df39dedbf6d75eb390e72c8a9acdd23a75282cbb
SHA512c446247410b61785caff8ff5ccb6714e8ad61f751582506c7ffdbd9872b98185911c358b4885f2b2ec82953102487f42bd92d68aa1babda4fa3ffea242b0061c