Analysis
-
max time kernel
58s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 08:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1PeiVXXy-7N3t86xms-7n_7evxhQ2y4fD/view?pli=1
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1PeiVXXy-7N3t86xms-7n_7evxhQ2y4fD/view?pli=1
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 6 drive.google.com 7 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133699984859273408" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 5992 1868 chrome.exe 78 PID 1868 wrote to memory of 5992 1868 chrome.exe 78 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 3884 1868 chrome.exe 79 PID 1868 wrote to memory of 4328 1868 chrome.exe 80 PID 1868 wrote to memory of 4328 1868 chrome.exe 80 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81 PID 1868 wrote to memory of 4604 1868 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1PeiVXXy-7N3t86xms-7n_7evxhQ2y4fD/view?pli=11⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb74d0cc40,0x7ffb74d0cc4c,0x7ffb74d0cc582⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2152 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4104,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5016,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5060,i,9155363339445468077,34400933569741101,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a8148e585a62494dd3cdfb2a76dc06a5
SHA153c6a00f7413ae04d97ccd24c277ceab500cce85
SHA2569254a7e96a63729c725da211594fed2b27a5ffc93600552b11c74f6eb0f236ba
SHA5126a28d809c817496afc42f8a9d4492452f3af949a4a9b6a1b3912488ee53bea11343a11963d7937abc6722f54f4e711c28ddeaf318d8ba16bfa083ac7c80b5078
-
Filesize
336B
MD57ce9f75108676ab91cc6dfbd672b4634
SHA1a814a5fb6981400dce50cefa77c589375b3f2364
SHA256467e15d12f900eb040ca82a2c83501e56c7b3c5708354c108afcbe8bfbdb239d
SHA5129201eff075f5443cbdc56590951e4d37d86a64f1eb795f450303ddfc4ee61d56bed712abacca6312f7f1f7f373122da0057a3867a434d7c96ec97a589624b722
-
Filesize
1KB
MD5c51b05befae9e08826490a37d17ff2ec
SHA16eddc9ae3e849cc99de1f050c3f61bdcf3ac5cc1
SHA256f95c9c4e723b61340117f8c2e7b04dfabe5d1d9c581138a2b173217595d02581
SHA5125e49b0b67f22a85ab785fdb8d938217e652391881a09aa54ae2e90d77bdf4b7c2a435d1e1c994c11c7970fddbb95c6e96022885b064c7c99f550c157803c54a0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1024B
MD5ae0dab0dbfd7ff893fe695d26171c673
SHA10f1030da87ccd8cdb4f684cfd3050cfe024d411e
SHA2560b88cfec1ebeed6a5c28f6ee1c7582aacded5ceab4a5ae7d0bca28e8c7d744b3
SHA512d0a8f2dcb2fecb1aa739cf22f7be4bf38ce4b831fd5d3c86852ccdbeff9f0e4f8c80ddc9e1a425540eb9876b6821e622eec96ddfb785029c18e5fc9f55af9428
-
Filesize
9KB
MD5b7ea2a92e84d74c0a22a17496cf036c9
SHA16d091043b8b586182d152f69b4792c454a232072
SHA2565ed67f50c7cead1ebd85247766a0443ed7dd2a7e171a8bfe3d12a36b7a4af766
SHA5121dc558725cb1eb532298d002f869e77c35aca2e7cf3bdd33d8c104553e9259fda9ff011b801b369799a9d3f7b43037056e8ff61f99e3bf3aff19bd91c7e3e95d
-
Filesize
9KB
MD50ab373cd0638442eab1762b6064cce7b
SHA14220c50039d95191661467bf7dfd5586eaa1b47d
SHA256337d36f0775c9024dac8fa52971328e7e7914a82cc6cf0b16fc1ccf0938ca0f4
SHA512ecabf19023a1f16bef99d1bd492d1923b37c980fc548bb39150b514c74397bc78df7835bcd7c584008a0f473f11fc251a0164edc46ab207f20ddf8734de5c6b4
-
Filesize
9KB
MD585551c2614a8619a2ea84044d119cceb
SHA1b6146cfed2bea97771cc887eaeb9f34b18e6e96b
SHA256acbc6c1e5a3993f2ae45a60d82f27f55337fff21f9fc43f7b8ca9137a9536cd9
SHA512e03874a160bcc1e60e977d973556fed088e63a320825ffe7c91eed08d5df8623bc34fd86204794899279e35c01ba3eba702a99d4b4d25c3d19e5276ba50526f9
-
Filesize
10KB
MD5a48b315d5c9a33d33d55a3d4aad1f720
SHA1c0a20c762d0fe31f9225d5f5a2ef966bb1c195cb
SHA256d9b5e62a990a54371e11251dd080f9f09bce35a44f1ca5af95964fbed3d4067f
SHA5123de110eb1b82cf11aafeea3c9bb093dcc525fc66c1a54232ed48db457024deed7169c1634a7df093351d766b3edde4facb9c3735697b21d9a53a2f0835b7134b
-
Filesize
99KB
MD5bc89af25dec18d67642ed9d511d1260a
SHA177f41677e4799576dc643299c7fa4e93df15def1
SHA2567f2d0bfbb69db5f2c3cd803fc767bcfc42fbb70aa54e93366a9c1dbae0821c5b
SHA51235c84856539d933f2f86184a8f39d686c481ca4ce9abbfa93761b3e9d053e093a521d3a87da67e1355824283f1c49c8dc57398fe23048f435a7a268f8dda2dbe
-
Filesize
99KB
MD5a0e7d6ffae522a571b12ff20a97fcc18
SHA17b851eb7bd026043fce1ec1ebd27b0fbde143f3d
SHA2569bf1789a2c58c96502e523bb36bbd2161d9a85b9e8a56fbee04fe0930d3eae25
SHA512316d4779c4edebbe15d731fcf3f43e07d97dcf40382bc0c0f36676e224ff2194ec1c3373eab516d50f14fb664bcf70957c590a3bac60338dc77ef90762e40644