Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 13:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1yHjMsJU2v9ccNvPKrdpDwsDtu76HMFcF/preview
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1yHjMsJU2v9ccNvPKrdpDwsDtu76HMFcF/preview
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133698447302634036" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 856 2884 chrome.exe 83 PID 2884 wrote to memory of 856 2884 chrome.exe 83 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 460 2884 chrome.exe 84 PID 2884 wrote to memory of 4512 2884 chrome.exe 85 PID 2884 wrote to memory of 4512 2884 chrome.exe 85 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86 PID 2884 wrote to memory of 1044 2884 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1yHjMsJU2v9ccNvPKrdpDwsDtu76HMFcF/preview1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff81faccc40,0x7ff81faccc4c,0x7ff81faccc582⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4652,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4956,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5116,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5344,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4836,i,4085205140962473967,6723174219665146956,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f31266cb61e3c03eb58cd71a05b9a284
SHA149f0783d114adfb07c22dd8ab14344359385afc9
SHA256cea54ff59798c77145c88e268365e44a51ebbf6f3f92830f34bb88bc3731b325
SHA512511fd9fa225c0b20d4a82a36fde754f34e2c254bc32b102ab19bd48998bf092cd681fbba490c56a4c3b233b3a514ae330850ffc6e3c8fd5a0e0f7f2b0fd92919
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
860B
MD5cdd83458fb404a461f438083b0441a0f
SHA1ab4c8156533e2cd265970b404d21870a5fb46ea7
SHA256fcd859a72e75df8ba7e047ddd3e6cf5a053877744a57975cfa3c04a4d1128969
SHA512fe0b7bdc994717e4cdf2c4cb205fb25905b28d36c4f0081410ccfc8166e2cc7b101eb2a29aff943c7d4564c877823c68c533f511bbdbda6e1477f181ab3ebae7
-
Filesize
1KB
MD5e9a72f1f947a0d3a251470f66d6e3b0a
SHA1b05bfd486c3aa635ff4800a82fecb0e17f51f646
SHA256dfe4959e729ed5bb8c0955397ec7309b8fa3f62f9d3018e58e89401deda56d84
SHA512eaed40ad536dae524d5c628b6f4062ffb6def6432acd295ca24df4827fc38131a735927c8368dc1254b279c2a90f27c859073faafd6950adcbd89a0c90677b7e
-
Filesize
10KB
MD5597ece57d0eea8a6d9983cd3d5cd75e5
SHA15d84c9e97258ffd61c3679de4d320309eb980902
SHA25687df7a2ab03ed221eb68937967d306c811919a85b12e8839ce8cc7fb2793db75
SHA512711a63efee7b877c1ba55a226a674c61f956b5ca48051eff3e11911180bea8d8ff2c0ca707b505a2b8914e65dfe23c30220f17443609903efb7e0581e521f309
-
Filesize
9KB
MD523464ce6f8038e74d61826cfed277279
SHA18e6d74d99cc3cebb6d6d3acce43d261e3565b6c8
SHA256723fe50634c33c65f3a3bbc1f7455b098fe06f5cc04f02123debed2f986f411e
SHA51267d15760ccc6a0b57e30e70b476c2998639d056365ea2cff3e7f1364d40f3872460e294cafbdc81f0184de43030adc95f84c51795c72294a957dab2e40b7704b
-
Filesize
9KB
MD5900619a84802ec34bb37b2e10b50a419
SHA15d2db224c3681eda9aabb1c5675d4041f858ad79
SHA2560aecd3054d35bf686324322dc27a2a1c400cfdf34ec2ae1d0415ea802e62400e
SHA51246d48105e74b1ee36ee3fd6df5d28d34a2a1430ae9347c5563257052db44c056196d8cf490d5b8586a2a8a072184fcc684f9cddd2ae59f4495c36a963f5dec6c
-
Filesize
99KB
MD5aea6f561002b799af64ebd4e20f7c302
SHA1596202a26d0cb083b0887f17fee457244bbbbd43
SHA2566a9c601d113b0121f09db313ac5aff3ab20e14a39564e8b204e687e16589a7c9
SHA512119a1c93748fdbfbe6bb6b1c54a968ebdf92cd2964b5eebe2c1e630737cf201205948ad877b46b24946095bf5f00937aee79a92a1f52f121798743b25841a5d8