Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
13-08-2024 17:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/0B664T4076FC0LTFhaThiY2F0dXRNTWY4dHUtanRrcW53TjBv/view?usp=drive_web&resourcekey=0-yjJNZ_wNh9SRVHhQ-6Fn0w
Resource
win10-20240404-es
General
-
Target
https://drive.google.com/file/d/0B664T4076FC0LTFhaThiY2F0dXRNTWY4dHUtanRrcW53TjBv/view?usp=drive_web&resourcekey=0-yjJNZ_wNh9SRVHhQ-6Fn0w
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 4 drive.google.com 5 drive.google.com 2 drive.google.com 3 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680429835124336" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2656 2992 chrome.exe 73 PID 2992 wrote to memory of 2656 2992 chrome.exe 73 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 3884 2992 chrome.exe 75 PID 2992 wrote to memory of 32 2992 chrome.exe 76 PID 2992 wrote to memory of 32 2992 chrome.exe 76 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77 PID 2992 wrote to memory of 4752 2992 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/0B664T4076FC0LTFhaThiY2F0dXRNTWY4dHUtanRrcW53TjBv/view?usp=drive_web&resourcekey=0-yjJNZ_wNh9SRVHhQ-6Fn0w1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9ada49758,0x7ff9ada49768,0x7ff9ada497782⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:22⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5076 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3008 --field-trial-handle=1832,i,7258365655715768847,14198160798059908053,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5d5c59aaa55f6b45cf15ee0a0430ed013
SHA15d3825381752ddd7eb623ff116b576444a456fad
SHA256ffa902c0869162028e4d7d9da6972ee3bdf956ea23e39c9eec9cf00ee2ff06c3
SHA512399c53b70ebe5d323901b339450015526812d1936db4ec91b27bfd4d5d5e9733250586e7c623b2db930d2d5d53ca9871a8788c1aad7c4fe2688ac940a65d383c
-
Filesize
1018B
MD5a43f3728e00bd4bb28e1825d9e5ff142
SHA13227976fbbc55583be0440400d064ef3f113129e
SHA2567bdb6799fbca94312e14fdb0cdfa7d606fe896e55ae8ba510231d52bb69565e7
SHA5122e16376ee489801e7e24035e106958ee28c56f2003a26ae16266235b8e839a39722cc59b2b60dfcbc1f89ce09c42e768ce6eda84aa2f9e0675cfeadb55a4acb6
-
Filesize
3KB
MD55730c9785b126e8706ee2916d784ff3c
SHA1c5f1b155c8919efd54eec048ffc756b13bc78a15
SHA256d09f722daa6b399c1180d27e14585e903a6bc429e12def28f8ee5bdbfb2f04e7
SHA512a92da3d286c00ac92c2cd54cdd22b343278e22326d9cbc897748c0d3b041d00563f183984a36f02578066d60a9fb1d59b561ea026a768d928122df85a12ed99b
-
Filesize
3KB
MD5b1cf11947895c52f89a48c3046234a79
SHA1aac43028fc78a8edeb9ccb5f1f59b36084a3db40
SHA25619f646c80045fb99c5c8b45816dcea2b22377f6743f6db9ce4de0c5067bedfde
SHA5120fc9842b3dff8e4840908bb0906bff196c4dd2ea3330ec99f8aef83c150fc8be368ff3291027c2a48c8d8e36137108b49e3503c94feaabb02251f6bea96894d8
-
Filesize
707B
MD5aa638b2379fac080ade9ec2da921c5be
SHA19da46cd0bece727067ff5c0f815a3a34c9f107dc
SHA25643695a0d37d68937124db09447d391a759c09bb6eee25fb0f4f2091b8fbc1682
SHA5128b494e00868d617b68b80a0396c6315a5c9a60970f534341c6c309b330bb6c6cef47d7b3240fc7f87d31375eb8f260a4077493c40d912fe6b1a669f6d2dd8e18
-
Filesize
1KB
MD5832cda44837d4289bbc63f2e0577e12e
SHA1c34c408e26ad8aca3e9e4690c0ec303faa9a3045
SHA25626ccedef9d87156d7dbb6368d5aea300fd69c62f5cba77ee0dfe64b2301183cf
SHA5125fddf25a74c3579fec9612cec18efcbb70ce6ad141ef36f512f0f1bf06d4a5414d47745d78b63f8cd257f575d37d700d2d916543a53224809ed5f417f5572ecb
-
Filesize
6KB
MD5cd98a80b284c7941727ffdb5c3f7a756
SHA17c6a1a1a6bc282ed8fbf9d45b9b289174354b6c7
SHA25666b0c52698da9b5901eb0d8e25c834f833b83fb1288ad505a093a89f0585059a
SHA512021147517c4fc2a87ccf6c6dc689d8ae944f9cf27e18a90ca7ee8ee0c9a75914d644812acddb0008343b5c8e5c4718369bbd83065a615f0cbb7668075db11d0b
-
Filesize
5KB
MD53aafb20dd647499c19d24d05f5b892c2
SHA160a51c3655503571d9d69535f9e06c7573315172
SHA2561cffcafa580c9041641fc1f1c296013fe3a9034f3d2adef56c1573f5d973b1d4
SHA512dbac2206e6daba069dc490dfc3c7ce4897765c54016274349bb2039a52a963615b46f97b335f594c2db5b89d14682a63c871fe6b678430bf6595542313a71c19
-
Filesize
6KB
MD520ca609fc6065184f8b9036c92360110
SHA13ad8615736959bb43eb1220cbdd7b4f2aa9ef63b
SHA256f6e83588380a382c92bfe6ee7db32eac8be92efaa6501e5424ef6820035fcd9e
SHA5124db78e7dc428a32761cca86f306188bb6cdfb1d6fb37bfc089541729b88e2650d761ea7299a261394350b85fb2e9c73e5ae8b35d2d25b55ed445b6afe349b7c6
-
Filesize
136KB
MD543037bde45bd045d4fab5aaef3f91144
SHA19c9f385081319ef1592d375c77ba4c7fdd90b619
SHA25605bb6ac2e9cf0b6ac2247d1558392779a2bcad563d462fa5c341305188013fd9
SHA5124e621987a5835de084f8f351b030c6803155aef99f6d19db25ada33212622eb639bfd5ee17f74ce0f3798f9e3f45b96880d3dbdf6467443287f8fd5398baf84a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd