Analysis
-
max time kernel
44s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 16:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=19n83wfbCWPyZKrPIQfBhnIs_NZ79dHQm
Resource
win10v2004-20240910-en
General
-
Target
https://drive.google.com/uc?export=download&id=19n83wfbCWPyZKrPIQfBhnIs_NZ79dHQm
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133721883574288454" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 964 chrome.exe 964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 964 chrome.exe 964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 1364 964 chrome.exe 84 PID 964 wrote to memory of 1364 964 chrome.exe 84 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 2916 964 chrome.exe 85 PID 964 wrote to memory of 4856 964 chrome.exe 86 PID 964 wrote to memory of 4856 964 chrome.exe 86 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87 PID 964 wrote to memory of 3368 964 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=19n83wfbCWPyZKrPIQfBhnIs_NZ79dHQm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82970cc40,0x7ff82970cc4c,0x7ff82970cc582⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1500,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4500,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=208,i,18125170057115730580,6119084691072097244,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5f114d07a4544feddf6b02e60bb115262
SHA1a42806f6c45f39e627bbc6e0f0819afb8881c358
SHA2560d20e9718b8879395e4dd2456ec466c8240c1ba9cecd0583a59ce37e4a7eae2f
SHA51231e3adc6e1e4c8d072b6c834be1bd22ca67ad7313e87d88e71a9ffb5bdd741d676ebeccd5429e546385e98ec96fe44261540f70c1833e78b80131b4cf15922d3
-
Filesize
649B
MD53222937c0ac157e7cb98d080ed4e9019
SHA1480c14ca62becfe46a933d204598906e456fb4e5
SHA25693c58a5563a9e6e366e3fd35b0ad8960ab196f1aa0b717795dc527fe54a66907
SHA512a891fe924a9fdd8f1e1d99e2f6f9be2cc283bb79230d4d33ebf49a6beab77a007fe79df31993feece7c97746e3a4df261b56d5b47256432c8a43c863f1cc7bf3
-
Filesize
1KB
MD51321e6138bcb50755e21ea5c0787b337
SHA13412f1c9086220e6160c6a1e743abed84362e54a
SHA256fa96444019212cc1212fbf8ef73c058f0a36848e0f3ccfd57eb957e09a4cdfff
SHA5121d742bb99f2741b26a672e53c541b19c7c6f9fcd52274c17d496aa778a145b711a21a91dbd67f4d8d9126d4581a2ae5439885b564bc7e377c9b2e942f0ef3057
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5881bbc3f2093d84c6b791f37f4b455b4
SHA15503801f6051e33933d692e3bd28bc31f1671252
SHA256dbc21d41f6781991d5622fc28d3aebc3e6fcc0604c1fe47de753646a8d7bcb4c
SHA5127c2a11df93b955dc414d992f7102f24d628a354106d287bc53ab5a629499f773d6c2fbe493faa12054c25dc9e8d7ae2882a1831e43cafd5efc8093c48f28aa34
-
Filesize
9KB
MD5d4d3d27de3e912e3b070a33689728be7
SHA11e6b419ccd792b2ae12e529ed786693699d5c293
SHA2569b1179c156f2511eb38d5ab095b11bfcdb25cb1bf563e06e689c1240f7619687
SHA5124a46e954eda494d630622167b6a1cf963d4bb944451fc53abea428cbd052c3ee8e5694586358328201bc3e1fd23ad3a2b468a45086ebdd1e8ee66ab6ece78952
-
Filesize
9KB
MD5a08f6bad8c6f9a731a76503d3d59761f
SHA1525da9f2949f3673c19994d2dc60e1bd7fb972ad
SHA2569fff364bbfffd121bba91868fbeae53798bb9839f086b408ba3314340048f915
SHA512f570a076c736486c9756e42d365e3e083c2d99c2d0ed7b65977a9de6466d02443c5aecdd799fd225ca1aa61d41102e5f114842dbd52423eeb59c24c7fd4dbf6b
-
Filesize
9KB
MD5ff68daeb4be927c4196cce695ab5ec2c
SHA130a22e8eccfe47f995279d3bc15af16b89603b95
SHA2567b6a3ab84a9fd7738e12ec1e8fdf0afccbc191e811cb931edb873d50c7ae7792
SHA512ff15e4b2322c09ce297715318ba241bd087d3dffc5d5504203a0502d9b6f0c4138140b6d17b545bfdc7869a9dffd1d9c86c54dec6ffc466b040aef809ef9a6ec
-
Filesize
9KB
MD5744bb969b795835663e63b8b9c4d18ab
SHA1a5c4c343c883203da485619646d1af3f8362582e
SHA256127682115f57e0aaae206565fc984cb2405df363c636f019ed7940d356dd4d61
SHA5123ab093763aa40931e3881e4a28d628d705670d07b21c5b812fecf074f8415253db8fab8bc0535e4d72548c8bbf970ed8641e7f33300a1b9210c0fda6276a006a
-
Filesize
113KB
MD52903f42cb7e5e7d719e685516485ed89
SHA1d44aac0336afaca02e3e5f1d629bbe1d16d92732
SHA25611f35f0c395ebdf63f669819906d976a86454a705196061c4ed9da6b8e118361
SHA51232850d4e989c2e455ba13d929f6a88bded7fd6864f89fa973d05519cc247d0e5f18d3f186ddacce8df0aa3390d76f4bc87886d6aa100e4b35e05cdc3925de7a8
-
Filesize
112KB
MD5b14814c48de37cc93f1b744e9e5098cc
SHA1133c5e4e41a154e65f9e38cfbd3ef3daf19a811e
SHA25612393eebedbcbbb7e431654e2837541dc3f58011d1e150f34a893aae2a783c06
SHA5121dd2c665db0df3fa94151826bb208e3ca27dd65b90d79642cd516d552be460bac56797c50640bcfdd09cd6ba02490e66be7ac614e7d284a7c262d294e6c9526c
-
Filesize
113KB
MD5dabe3204a306842e2281a2b3833734aa
SHA1134fec8ac9257e1a4b77c3e258757e8c2723fd65
SHA2563a0ae7b08c1466cdc6cd36c72c241d5058111c8f31517c06d0589026123021af
SHA512d18c5fe64a7e7e57592c9ee8c58645b0ce39548d2d57be5a75c9100bc0dab47297f2b6cb64c466d8e78bfe7c9573cb52c620a02f9469d58e31b2701646779544
-
Filesize
264KB
MD53c61f77358b4d06f8265568430d60254
SHA1e0b699dbb16ac8e784f4363afd5dff9f4b7decb6
SHA256b5d0489c1ae487290d48ddf18dd3ef3bd976d86ed4d208b8643de19b436b0753
SHA51221007d89e339117a5036b2ff2e13a72dbd0547a4d32d7d3b73d8b1b62180cb44decb3bf298a7b31c8c02961f32e8c5c9c44477107f960b1f63319122d86d6de3