Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 15:11
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/[email protected]&
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/[email protected]&
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 drive.google.com 11 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687267326750680" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 1560 3120 chrome.exe 91 PID 3120 wrote to memory of 1560 3120 chrome.exe 91 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 2380 3120 chrome.exe 92 PID 3120 wrote to memory of 5112 3120 chrome.exe 93 PID 3120 wrote to memory of 5112 3120 chrome.exe 93 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94 PID 3120 wrote to memory of 1236 3120 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/[email protected]&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8a22bcc40,0x7ff8a22bcc4c,0x7ff8a22bcc582⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4872,i,5884416077440335282,15186996376602928526,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:81⤵PID:5060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b67c801c28beeba60abf4102336107e4
SHA154d6a210432abbae7695b26b4ee91c1831d928f9
SHA256d950da9a102d2603a9351c17771357073a0aed27d100576c88c044cfd9ea3533
SHA512a4ab7c8c37b89b1b8f11327dac1ed83d5e8dc71a356a031cc8fb2f255ca000d5fb1a718f5732ca12317b41fccae2dd9b3575ab3efe30323ba6c0c58976aba7b4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD56eae1b1355c1a2cd8e60542ad45bff7d
SHA1a5e409305d20e4f2d06d4665c04317b0676ea98d
SHA256c8f1b6570b235455c122ae9af10601f0643dc2c89860f29c9f72f4c2d76782d2
SHA5125dd0051ebfdeef9e776c424c09588cff461754bd327316a7e091e71ea624681b07d2822488e79d327398a4a8383290f921d34188212ee40a5858b4035768b003
-
Filesize
9KB
MD5d7e1a4588b70a98c33bda893c46c61aa
SHA1efba1378bd3e511fbc1de26a386cf0024081f3d6
SHA256306738edf7a9c124389be88895745d16d595be785976ffdfe93e7bcddc7659e3
SHA512a96192d74649572fb85545b04b2e91fc9f1697f08287ebd2f3b1c27d0365bd0e7097c620792053a3339eb0c3120071fbd534e4fef5bf368eaebfe9e8f5d293f9
-
Filesize
9KB
MD50e1d30c592a44f3158fda040a6796550
SHA1ca84fd65b29faecdbffed90a965514ab30ac439e
SHA256d328e1973d9b20a0751efa88a9682d5f6814f4e04f6c3e01d1191ca9eb65381f
SHA51200db342e8cf0f58bbbc1305e5d96bd0eaaaf076f23d64d411955769234902bc045c6aca59149442239739eebbb5de4490f2c1c71f539a07751a3151db40e6fe4
-
Filesize
195KB
MD59931d217a7fd7b4eb1725d1f4dd9dd66
SHA15556eaf7aad19e660fd441b22859445f9a73ddc9
SHA256a4144aec5a4d01afe4bab488c0327050888c3f0370c3c610e26d4da04fc02ba2
SHA512df50e184c403941379e30109d14c36a88d74bdf7ca2c79b83818702f35a7b6ca0bc4ff179f0fc7af0bd3971195b3c4f1e00fe6621d5dc0181f8f3e024a85616e