Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 17:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1SvZJqUwhWGZ6CtBCCFZ75SAsJVJXfQ_g
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/uc?export=download&id=1SvZJqUwhWGZ6CtBCCFZ75SAsJVJXfQ_g
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 6 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133688218508330177" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3952 3876 chrome.exe 88 PID 3876 wrote to memory of 3952 3876 chrome.exe 88 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 824 3876 chrome.exe 90 PID 3876 wrote to memory of 1600 3876 chrome.exe 91 PID 3876 wrote to memory of 1600 3876 chrome.exe 91 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92 PID 3876 wrote to memory of 3256 3876 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1SvZJqUwhWGZ6CtBCCFZ75SAsJVJXfQ_g1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82b2ccc40,0x7ff82b2ccc4c,0x7ff82b2ccc582⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1888,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2220 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4348,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5192,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5476,i,9835131513512170778,11000320492821735265,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57f9ea334089396c69392eccdeed9dc30
SHA1270c388704b331103dcafad053b3448c9c6d20b7
SHA25687726b76f18dcb8388cc44cc6a0847636b9c9aeb1bf20ae91f5885fccc1c91ad
SHA512e09f4d4a82e3e87d272617c4c645f676e9bac3c85380120bf938d746b56f4e153084d099205cb1b1336b2bf345fdc00f1eebde18d36a374daa120b7f5df4a305
-
Filesize
2KB
MD5e3d93d041604ad5248469cd9cd122544
SHA1741b8609abbf02a508419a02ac7e6b069f1b9b1c
SHA25684ff0067f913b7128121b1d09a2d23abdd3c889cede088587e34a53df4ac9fda
SHA5120fa7f7b5fc12743f36fed1be51bc2e581a22101d6c96a6e17c8c89baba2eae2481c8f97c5bb8a6af4d59761c0038c2103e9d4433024d9bc3dea38d19819dfacf
-
Filesize
1KB
MD5b2f1ae64b809732fab41411a6afb7683
SHA1f2ec2376a6e4dec5a17bbc47f8a91525367669d9
SHA2566ad09cd1785edb884f93ed872238641f95622f94447937f7eddedaec281b2a44
SHA51234c27485e0f03169a9674986f4fe3feec2b63583bd1673323f828ea50bc32077e51d6a1fa1bc7512454e1a90c55720fae173d3b47b16d7e6041f0481f6d36bf0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD586520852d3550c3b4118c90a5d596221
SHA1012ad84ddf9930127de65fad7c1cad0807ad8bda
SHA2566c1c38c60862d5e5741afec32d77ae7366f920250a45180658a142500c42acc2
SHA512608f7ab55b215cb0033a837ed65dd90f9d9cae22d092476acb6de55bc4dddd5c393eee1ce3a48ae7dcd9671272f7f54048517bb0055454df62f33808cc4ef286
-
Filesize
12KB
MD5417c94e7ffb39b04a267ba98fed1106c
SHA17ed9d6e0a2763f8ac84a14144a09073a325254a1
SHA2567bb9a9bc3bf2f9dea0ff156ad32664332b8ea8138e2b7dcb158c0b476086de82
SHA512b02c750fdd5a06360a4ee095ee52630d540f06306cd97597f3af197db2a732db064f3b0e43165a3b2f128650a77aee3c3b9d43d94f08c94266f231198d10e587
-
Filesize
99KB
MD5db7f401dc18325468663f948161c9b22
SHA1e5dea6903faa13e9c4bb97c680e649321e33f18d
SHA256dcf566b98fbd73bf5d4a9ba6d1aa823cf72d5b26cf52aae7d5459e891a2360e1
SHA512038a159871b9726eb9555553913bb99166d0eeb5756b7dfbc4f2299184dad49fe6fc05f991cef4aa54b127d47be5c6e8fd2d7985c6bce9cee598d80e840455cb
-
Filesize
99KB
MD59cb5e9d72033459e86e94ae5e2af384c
SHA1fe9df760924cc32b8e4c6ac748ca1ec4a2f08f31
SHA256531eb081b2cb2145d7b3e90cfb6a525bcbb91c50d15f6bb4deea9e4c8a79ba42
SHA5122c586622ce7d8e89db8209e9f09e3986979b7b607d3efca307344787cd7282480df34c1c4487cb064b8992cc71763bc198a842a28ab7570089583f982e4e69ba