Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-09-2024 12:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1nklCBKYcqBqjwFSSn4JYdofEPaPzyMAC/view?usp=sharing
Resource
win10-20240404-en
General
-
Target
https://drive.google.com/file/d/1nklCBKYcqBqjwFSSn4JYdofEPaPzyMAC/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 3 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133713094326209653" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 524 chrome.exe 524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 524 wrote to memory of 3264 524 chrome.exe 74 PID 524 wrote to memory of 3264 524 chrome.exe 74 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1964 524 chrome.exe 76 PID 524 wrote to memory of 1808 524 chrome.exe 77 PID 524 wrote to memory of 1808 524 chrome.exe 77 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78 PID 524 wrote to memory of 4876 524 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1nklCBKYcqBqjwFSSn4JYdofEPaPzyMAC/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffacf5d9758,0x7ffacf5d9768,0x7ffacf5d97782⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:22⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1852 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5108 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:82⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=2020,i,8917738129883376165,10151276910458080988,131072 /prefetch:82⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD56dd58b3ad0e8b072e5035dd72ec87311
SHA1a87c49d061845aaf91ca3ec3400a3496ecfb7d55
SHA25657c260e3ddc7054884125034665c9f22b2c6cb28cfed6f1c7b43b789b5b7b57b
SHA5126f77ef4f65819a06ae4f2770610ef41428b244428606c4a3a40cb26e8d2a03ad3cc30449ac97012e1715a5beb22c34fa1969da02e028849b027ac8e2d1d81443
-
Filesize
4KB
MD5921b79ac16434be11247517f6ffdea12
SHA1a200892d130fb16df18a7ffc566ab100e66f0e3e
SHA2568bb784907555fec09a7f378ce916a046460baeee0ce7d0f68ea127fa9226a5f1
SHA512b9398ff6bfe2c265f3f8cb0f135e40408bb42635c63211b62a74a8a72ed062b676f196d93398713e1e8497af94aab3a7bfb81b4d70c84e444915c8733d57c258
-
Filesize
874B
MD5db08892956a2f611059096da7bf1015c
SHA161e6c4a981f40c55b7fd76283e47d7caeed08190
SHA25610e5ade96131f434825757c7cd3008db038220a9a5fcdfd75302ebba1abff339
SHA512b8f37d95e436a968a36a55671744741778de1245baf329321d14e8c84e211b59e2321fc845e4905422053c76107cbb38e86adabd0011b43e43c26361f9d5f0cc
-
Filesize
6KB
MD5840ce237c103f86a0447834f64e5e45f
SHA1d0308aa5234954b6bc6cbdad9e21934e77b9dae3
SHA2563d373be59b24e48e6640442b7985b68081f66e35c6967069d2ef5bdecfa76df0
SHA512cfebfc936a5bf2e4cca4b431cd955ef0453cc94d00b3bd8a4edaec5d21e5722871644a0f5798a813fef10754f7c2f8b6b003953f61308b0705d131a6d316cad7
-
Filesize
6KB
MD56f89a7326f8a50785fc3365925790a1a
SHA152ac529141e4be7e9fe899757d5b93d157b964c9
SHA256f73c3dc28495c2da77e281241348f22ecaf066373dec491dacd65fb04b5f0934
SHA5127e27636f7b60b11eca6b17ddb3946d1c78d9f5ef17d790438e81d2b08a02b28c1c3d5c25b8b0ece8882cbced4ff9ad747396afe7b6cb0f4aff6eaccdbcd45a04
-
Filesize
136KB
MD5f6a74b6ddf0eba9cf645396b3086dd35
SHA13bcfabbde719ae9ce9b54a8b9a2abb7433790d27
SHA256176f0423ec15f47f52efffabbeb0d13ee7a3d96ac8bc3a4eb07fe356386ebaaa
SHA512f23794b15afa79dc812cf85d49685704763431d269b972cd454420d1a4940d19d7ad1816d3d8cdb55ec45f71a48b3624daed306aa029be12c3368fc06811660d
-
Filesize
136KB
MD544c7b4321d478f9cc237636b70d21498
SHA1c6beb027e4c736beccbdf40f598e2b6d99162e98
SHA256d3680aaf12e54ea638063f19686056feb6ce1844c9ab5cdc1ef770c800a34a4d
SHA512f2ce5ad5b22e8a1ab22e9ad249f672e8f9091de2ef46576eac2dd07ce963ad61ee257715753bba73c78ebc3a7982d1f1db6672e807db8959e3129f32716bf619
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd