Analysis
-
max time kernel
15s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2024 17:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1h_bVyodVtvulR5aq1vtYr1WcOpNZfprz/view
Resource
win10-20240611-en
General
-
Target
https://drive.google.com/file/d/1h_bVyodVtvulR5aq1vtYr1WcOpNZfprz/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 3 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133689064399571543" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3816 wrote to memory of 2200 3816 chrome.exe 71 PID 3816 wrote to memory of 2200 3816 chrome.exe 71 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 4996 3816 chrome.exe 73 PID 3816 wrote to memory of 3440 3816 chrome.exe 74 PID 3816 wrote to memory of 3440 3816 chrome.exe 74 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75 PID 3816 wrote to memory of 1336 3816 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1h_bVyodVtvulR5aq1vtYr1WcOpNZfprz/view1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffac85d9758,0x7ffac85d9768,0x7ffac85d97782⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:22⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1960 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4708 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1920,i,273307662165582498,12264614963346584156,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf181ac8dd3e3a084147e926b458a88d
SHA1d2284613640639e1a506f48c81946802bdc31b05
SHA256c63a571954b48c84c1eb6bb937f13441354ec14002f34d1943cdd86f7187af9c
SHA512d1f6467e887a235b072389eba90d1d28bc74cfdf826e9f90a32999f53d02150a6b66fdba6360b4f8bc9a8d1035383244743bc2515321371fad32391c0c1ecf60
-
Filesize
5KB
MD5e3251444136050493e51b6116a1eb133
SHA14a72e22c89083e50f5285d778a8bb7b988b1598e
SHA25656146ff97ec9e77bb4af810b013dd899cc57f97cf74f77db63dd9782c2aaece7
SHA5122b04f60fdc845ab9106fda453ea94df783be8510d48ba61f3a105659e7bca7f984c8e06845d6241658389b9ebb58d1f9b25eb4dc7078ba953ca4e588107949a5
-
Filesize
150KB
MD5fdb5e5feeec2bf23ccf3cba2163575ae
SHA171ebb34de5d0a5ffc56285b139a09feff582398e
SHA2567695d2b634092516e831ee53b4125a7d6607de3f65dd38898c71a1625b31b596
SHA512db820d8000146036cb6e4c9019afbcd6e7a2dfccebaa37bac41b58fc8771fbfa909e8a600261ca722c35a07062e45f27ba89a46fa672a0c69110d2fb1cc86cfc
-
Filesize
150KB
MD5043fab03cb5de443a974daaa46a8b72b
SHA17e1f1113a8b981e5f893e4aafee86da92dff4b43
SHA256588dff9f26c575549cea4d275ad3f95d732a5bcb0a45034e6e4de9c99954a7c1
SHA512c90ec07962e902b84c3734484fbca909bf2105cf7190725e6f2fe9242bb83b30469f8af0b3a0376ebaedba537081ed9930af2ae53674110d2f32f3c5546743dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd