Analysis
-
max time kernel
98s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 18:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/10GRq8pL-ZqDmmJsduHsg67XFtNAcMbXj/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/10GRq8pL-ZqDmmJsduHsg67XFtNAcMbXj/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133702933840354519" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4800 2028 chrome.exe 85 PID 2028 wrote to memory of 4800 2028 chrome.exe 85 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 2264 2028 chrome.exe 86 PID 2028 wrote to memory of 4848 2028 chrome.exe 87 PID 2028 wrote to memory of 4848 2028 chrome.exe 87 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88 PID 2028 wrote to memory of 4724 2028 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/10GRq8pL-ZqDmmJsduHsg67XFtNAcMbXj/view1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbc57ecc40,0x7ffbc57ecc4c,0x7ffbc57ecc582⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2036 /prefetch:32⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4348,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,14630828506196645871,1070945564728483403,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4516 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD533d3d878bc81053690d27acb038e7fcb
SHA1ca26fd0e3b152e4e3681b8eda1aef1038ff2b09f
SHA2565de68184d6c7fffc8b95741e998a0082a165f56c490dfa2f65c4d6250bac4248
SHA512e705d7963fb36624d047530290389b908faeff8a25dc96a96655729a5e9464ee44e5c1284f2d158f1012ce54046a80d5e0fbf99f064e087c96ef685f30afc76c
-
Filesize
336B
MD59293c9ab46c57bd9d0c77d9cee2f0c69
SHA1cc6b72579d57b1890a41a523f8cf4bb15bb81899
SHA25611dda7966f2e082c16b2d32bfb5b253f4f17417a0ebebbd3ad4530d72688d7ee
SHA5121e7d71ab5f4bfe5d141c58c53bd32f3e897f68e232d6983e0364a7e15d909c21b30bada159751125de77b6f2010bdf23ed10ee9286ad8a9e39e510a9c6291006
-
Filesize
4KB
MD55d369ba8d29c9059639adbcb312c7993
SHA1bbd109fa472803bd512ab0ded593c2cbbe1a1dfa
SHA256a6efa6c1438b62ef2defc61522f75ef71d49e6098a7861f59a75c2bd5b86c623
SHA5127423c9b5030fc9d1f2eab34869d67712ad35e4e2805bfcc958ef66057777bad140576f7bdc7d7496112662ad0e278b49ffd77102b75a6ac27c456be97d9c4d1a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD571bc1001e6e27ff4cef8b8b86ba2f09c
SHA1aef9ce4532cddfecfbc24b1890933ddb5067200c
SHA256ba596ab7fb6993c0cdb09d314862a4627ee5f4cf6a6f8bbbdf1ad0df653464bd
SHA512e39ca8e8d86e043b0e2eda2d9620f29a41a064394fa6111ab5e09287525f71df587f5a2270f6335d719ac4e35f0dc5236b8fe1db6aaee169571dd90795b38969
-
Filesize
9KB
MD501e47cdf7acf8d07ca2373976f232e6f
SHA1089d43d99610505aca0a1e7924628c2cc033e967
SHA256f4d4ad1c2f922f7843b7ee8d390a5c07a90d7665c333caa57f2169a47375ef88
SHA51236f14bd7ad127fe22f23f97a1a480c05d1cd0b8e2c28166d77afd3a5150278bea51085749b6bcc005851b91ba52efda8e6abe3f75de055cbd0c066e70bde8773
-
Filesize
9KB
MD58c369f584f8e10ba92147eca0e5b3eb6
SHA1cf45e96c1b1405989676c7c118a3a6af67fc222e
SHA2566a484e6dc6225ba5bdc0cbb4ebbee17ef65e37f651080e409be2a522a47bea2c
SHA512eecacbaae759de913f72850fe2cd9398d6a36151e1c9d3dca81ad37915cd63c72aae9d621ca8692c8d4dfd8726bfa84239fb4c4bbc81475f7e04b78452a404cd
-
Filesize
9KB
MD50dc4b64d037e64389756b1c20be52621
SHA1e729044c7de77cacc1d12ffe2368acaeab3c9438
SHA256d1590291c4907cf3493f3ce2b091af4ecca080f939ac94645fcceb995caab0c1
SHA5124ea98660d8764c8cd22d9352085f067ee3212be0a9241d15518d5befac82984391345fd1d1c6195da675d801f8d6afb164852711f237b4628d6298e4cd55e926
-
Filesize
9KB
MD5af42be1a9897310760a758642f9befc8
SHA19bc96efeefb262e4fc4f51bb4ede19f7ab61328d
SHA256b8e208948ac46d65f03d4185f115d7664dccfccd71e3a606e5b49fc06170dbc7
SHA51293abea529321a2005c715f09752b603afcb4db2a1bbc489cd8c22613512383bd5bbb4842fe40ec92a33fe5e87807468580569828097d20e8ed005d6119cb2ab1
-
Filesize
9KB
MD5c6425bf61f91df177910ff9a66fde4bd
SHA164d8d81f342a7e682cdc421c4a29787117275bcf
SHA256db969697a063c245feda2fab48320879afac2c56fc68139c33b333c24057ff2a
SHA5123af8f80ae6bd438332851991e78300ee5b95f1bb600ee363790a0c278f041b546d65c27cec059d0f77ae3c516aee2ec70f504df0e5760b89fe41564dcdd7b742
-
Filesize
9KB
MD526db53bdb491ac7d2bb7211c0f33d306
SHA14c899bdc6d4ae38ddeb37e0e3e4f57c0e5e15c42
SHA2563ec59964ab226e086ede6aae8b19be355821c1a617770d9e0a4e9b582581650b
SHA51277a161eab12331c729c7d1104d72db873807b45c04b781859f39587cf21632891acd8cca067894fcddc30136bfc134ac8bf55db0e03967917c9e7e733e99dd04
-
Filesize
99KB
MD5adad0ebfda57c551e34da046a4c63587
SHA179c83be947408b00e7d8ad104b79511c117bb9e7
SHA2568c9b4d1ac9465d623c0d52671160413c1d7ade6965ec4871678f38354b59ecba
SHA512939e254f97581f26dd35478ac4ba64b053bccf6214cc98b80d464db29ab8bcb1044bd920e1411a970a106dd08a29e6a339c84bec46b12f8fa193803b5bf824a6
-
Filesize
99KB
MD54e91220b2b9e30c14f454563ed54986c
SHA13df56cb45a57e5de55e154f5746a68dd44a46a17
SHA256f2e20abd778f52e7be0b8690549bee9280041e126b1e0fabcd5afd8e14060c44
SHA51247fcf30c57d1b008e2b615044818ae9e43196031258b9a04f4342b3715e74ec2e2850cf43045e0145865bfc8e33ac19c668cc3420a11e15c47b6054e7e834439