Analysis
-
max time kernel
38s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1dDdEajCOSTriL0r-um8hXUnw02texsmA/preview
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1dDdEajCOSTriL0r-um8hXUnw02texsmA/preview
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133694986991372987" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 816 1160 chrome.exe 84 PID 1160 wrote to memory of 816 1160 chrome.exe 84 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 3736 1160 chrome.exe 85 PID 1160 wrote to memory of 2832 1160 chrome.exe 86 PID 1160 wrote to memory of 2832 1160 chrome.exe 86 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87 PID 1160 wrote to memory of 3244 1160 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1dDdEajCOSTriL0r-um8hXUnw02texsmA/preview1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff914d4cc40,0x7ff914d4cc4c,0x7ff914d4cc582⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1764 /prefetch:32⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3104,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4708,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4996,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5108,i,8907320873429746943,3012921150500946435,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD515c0e46cca987ba4ff0c5063c8e7f18a
SHA10530fe139608c8a31dfb2f8e1c7f57c273038f42
SHA256962635d685dd8dc51beb9f1f88e880778e462e537f42bab06ae99e1fd2df49aa
SHA512d552a0c04fb3ad075c41f14b2f823fb3df84c3755afeefccaf22c78f4587204b55f69f21ba1797fd5b76a0316fb61e70a9b4e3e97c1ce4f82f6c0b47d3bef98d
-
Filesize
288B
MD5cc1719470f86070a7ab3919c7d5a8902
SHA1ceac6d1ea344a7cc8f74c24d15ae33df8f80fdd7
SHA256c2f1c9dd37c7dd1d1785d46c8d08724d9586ea4992f494ecb2fff1233de62e62
SHA512cb93a2e03b9a80aec0851de166bfd5cb5deae90bf658f2a41a92b381826eaa98dff095896001f8aa8792374cf218a19c8d2acceafe8d21c5b8d0397ffaaa2c31
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5e7ece36a5d7aba499d4e1252b8f633c9
SHA12e07e43b083db873c10aab319ba389ebe005e01f
SHA2562720c55b7404446e4f5623f4c5cd5ad8f68d37709f84549359265e840c8b0fb3
SHA5120cc159e808eee05e1ce216efc795b2b5e24e5b8dd8f5b9551f9fa1d33531e7f7b9f6b55f62f3effda32c3fa66d596f24b263a4d3e1a321b404e1c7e08bab12ec
-
Filesize
9KB
MD549ae087513e51ee164d0f8fec42ed725
SHA1084a8b5c311e0e7250fed9956f5a3f8be77258c4
SHA2566c7de2adf0c72eb693852ff6282381e76a4dc603d89032210c77d8a24270f976
SHA51208bfd54d18a707d528cbb1713692bc6bfe7870be5c8e3fd4ecb6eadfda542d73d2a08e3e5d66bf789b51d8159600bf6550173796d8dbb6bdf27ba945b9f022fc
-
Filesize
10KB
MD5ef42c57606d4231a1b590d7bd00b52e5
SHA10a62932b334c2b829b39714339c4043cb1d400c3
SHA25686f47d0ebdb8b9d44f9558b8c7e0df7c7394e02b861b92926e7d0aa1505ec3d9
SHA51242eec220dcdaf41b88e4bbcd5dabfe3042d1b95171402811e911d6ed7ebd802ae95a38155d978cec336bbff499dd571cf5c4bf570ca35902b624ce486a34e109
-
Filesize
99KB
MD543341b17b3d98b956d7ed7009cd79ca4
SHA169444cdd1499b301cf3a06f3d3b1f58c8a58e74d
SHA256b3810547c8d79ea7723d872541ac2cfff1bad932a0d0499797ec95d7e71baf2d
SHA5126232ed6c327bf57d44299fb18077caf9c5512370020789afecb4ba0562ad8c71ddfcbde44762c049fa9bae86db78fe2a9dc2c4dbba93523567255cfa91b84846