Analysis
-
max time kernel
10s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 03:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1kJ0YiJkIs1OWZtIjKGxyVTzzGyK6k1Pf/view
Resource
win7-20240708-en
General
-
Target
https://drive.google.com/file/d/1kJ0YiJkIs1OWZtIjKGxyVTzzGyK6k1Pf/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 drive.google.com 7 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1332 1768 chrome.exe 30 PID 1768 wrote to memory of 1332 1768 chrome.exe 30 PID 1768 wrote to memory of 1332 1768 chrome.exe 30 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2876 1768 chrome.exe 32 PID 1768 wrote to memory of 2916 1768 chrome.exe 33 PID 1768 wrote to memory of 2916 1768 chrome.exe 33 PID 1768 wrote to memory of 2916 1768 chrome.exe 33 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34 PID 1768 wrote to memory of 2852 1768 chrome.exe 34
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1kJ0YiJkIs1OWZtIjKGxyVTzzGyK6k1Pf/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7839758,0x7fef7839768,0x7fef78397782⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:22⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:12⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:22⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3292 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3880 --field-trial-handle=1276,i,11170015715778503434,13100573741857105355,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2588
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Ropro Rex\" -spe -an -ai#7zMap7632:80:7zEvent252021⤵PID:2364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x53c1⤵PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD5d45d979ffbb5f9299a52aa05d8824bb7
SHA154096ab5f4d719600d3466a13edd3aed66043d2d
SHA2566debd0064ab4cf141059aae8b31d96bb4170e6f4c4c256ae11f1759819bd9787
SHA51277d63aae8183c402e24b798c5099aa1ff722fcdbe5a07dc508822a42044dc0b855c0fac1a18c89ac13db98167e0b8992e6f8d77f65abe73a3a5b28111a1ea876
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
154KB
MD53d3d762642b2762d48400be52384d261
SHA1087308c0f1461af09fef9ad11f65dc07b93bafd7
SHA256298309bb75e374438b06fab1cf45c18cfecb534986cd36014f42ba06bfa02f46
SHA51286f6b9b1692108786e52cadf20f5fbb3267ba11e12b5877b6cbc2048aa917209d5242ecef3db8b2276d223acef3d27e4246a55a69bb927a8c36f80a7dca63228
-
Filesize
3.5MB
MD5e2a0ed273194518f1deb5eee7d672306
SHA13e54ed28a779ecb0e4fe2bf7fabe5750f10826d2
SHA256d2282af5830c76592ad5a51bd128f7950986d8ff2e85dd0e00db602d54910d96
SHA51202254c517492f877fa9cb65b0ffeb9a29341c4fac81037341987bdeb6ab9af991e7c62f154a7d9e786ac4f5415f7284b9c817ffd5b1167b43b058d8aac1e3554
-
Filesize
4KB
MD594a75b93caacabd05bf1a0987a14afae
SHA17a0606f4c9c8a8937dda955f9e2df6aae3c1da75
SHA25621706c41c93af0d4b8d23c822e43c5b7d7011c9f4ed5048a5aecf12a0f785ac5
SHA512103973cc303bd12d422ca329f9770eecdf5253bdd836aca681f9ef3f9818959a157621e7a61fbcdef8aa9e0caa67085ccf4c75379b1f67da0034a276a9a00a52
-
Filesize
4KB
MD5dda454c66f68e8ae133b96078358b00a
SHA168a61271b24db6844776e56d19e256479252679f
SHA2568ec49f381698bf428b7ea8f49fc6208479af3451d09a1223d4d24f93483c4438
SHA5126d45a90ca2dea977007cc729ae580f44895bb32443aeb40ed2949b8a754cfaa1309484eb86a42a24bbdd9c53afd1e0517c5b55e8648d2dc3f3d81bdb1c1a0d07
-
Filesize
4KB
MD5bd4c63bd77cf9e9d71a6879c935cc566
SHA1ba9dec87c2a1dcdfc3b778eecea20baa97432927
SHA2565013bd334055df78a365532496d3c1eb1e26315bb552f79d2bf6f37f9b836431
SHA512385b14b22cd791f64d7adf1955f0ed05f6dfcb85b5821ab3dd4dd1d0525952bc82bed72739bb4b40d5883205b48e4d6d28e507a42b84663d73b20da5790bca47
-
Filesize
4KB
MD5d0b1e7acc802bba89e15c735c81e0f02
SHA19ddbe137afe5640aacde424bc93e994523bd0b22
SHA2564b1f62dc79f3f1307bd916efcae0204b69f46734ceef420d46aeee469c24793a
SHA5121e9629c0f0e52535b0d93097afe1fb49c8fc9b700b295575f1c31ae227b99a2269bda4e10489dcc5b93cf00d9a5c7b0045647b1d1fe73c30d755ddbf8f0d48fb
-
Filesize
4KB
MD5671be8f15414f65774a8ddbe668a8d18
SHA1bc84bb42cd2f63d99573fb91575361481d90c71c
SHA256d158d4efddf442b65311bf433aa5449627225ab7632f519589879f355fa883a3
SHA5124102268aa07d374aa272d5a4fdab90d4b35febc360fd1905167b3e1653de490166a0611ef1af8023548ae9761a2b597978394c2e93a27e029d4c6b04e6e7bf47