Analysis
-
max time kernel
13s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 20:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1JPTvzTuTh4d7p-LwSHyF1NL4ded87UKG
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1JPTvzTuTh4d7p-LwSHyF1NL4ded87UKG
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133722892641964380" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 chrome.exe 812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 812 chrome.exe 812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 5088 812 chrome.exe 83 PID 812 wrote to memory of 5088 812 chrome.exe 83 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 4212 812 chrome.exe 84 PID 812 wrote to memory of 1912 812 chrome.exe 85 PID 812 wrote to memory of 1912 812 chrome.exe 85 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86 PID 812 wrote to memory of 2984 812 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1JPTvzTuTh4d7p-LwSHyF1NL4ded87UKG1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa1f18cc40,0x7ffa1f18cc4c,0x7ffa1f18cc582⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1668 /prefetch:32⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2220 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,3092579970541522294,10562244298307522832,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59243bf3248246b4536f1a90f58eaa889
SHA14b21fedfb5fe4bcfb82459c78d81803557225317
SHA2562109544425135ed175118b244c9fb0861f2eda1cb6e15d9394a6cdf2c61705ce
SHA5124222e663a0cd230ec1b9d464e466e59c9e17b74d7c020829115955564f75f85a70280d48db28f4d7ed27128a120a29cbecab7c291586705d7c3f55f7f6ee0a64
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD572be3430be7840d6ebc6ae7e0895e508
SHA1e747a77371816177b3b1449eaa7ee7d21477710b
SHA2564373876ff2c86e6ebd1311eebbdb6676b839e1758d158398e854a0ed2b6d7161
SHA512e79c7aeefa108a869ad2a5c3fd8bc13b38ae13b3746a5bbbafa191c9ad0f2d851673edba34a92ce3097d6c7a4b207e2a0a992c3ac82c851ec84634e21f97eec1
-
Filesize
9KB
MD54da63336faa03ce91179aecf0300a97d
SHA1ee11ef911778329c708cf339c7a86956620c372e
SHA256b14fc92f12bea7a2c30b737f419b5cd176d4a76307b19db3bebc1090b4b5f9a4
SHA5128ec2064300b43787d106dd327896cad4160bd1115aaa66ae6a534bc391051fdad71953736b06a0e5ca6d73205b616c521f629ac0442bec5b4e6ee9250e809ccc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons\16.png
Filesize566B
MD5b3b099003f605d552145790cf1b71e00
SHA16dc54b1268536935e9ac96a27c34c03aa1a1eccb
SHA2561d1113f78a60a4702db32f106598883cb864cd273a708ee292dd6003e3cc8d4b
SHA512d078de028160ea917c24ccbda0b74a8374a2153c7bd1f5a108710b102d64f0ffdc57caefe2979153a8d42d2e8d7a85089680bfae9f4facaaf048d8d93494d5f4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir812_23411492\Icons\128.png
Filesize7KB
MD58eec20e27dd654525e8f611ffcab2802
SHA1557ba23b84213121f7746d013b91fe6c1fc0d52a
SHA256dc4598a0e6de95fae32161fd8d4794d8ee3233ab31ba5818dfbe57f4f2253103
SHA512b19d628a7d92a6ec026e972f690bf60f45cbab18fc3e6ab54a379d8f338da95e2964ecdc5e2bb76713f5d3ab2ced96766921e3b517036e832148d1fe5fe8aa6a
-
Filesize
99KB
MD54652a6dc73ecd7d5584bf885384e4bbf
SHA12f65e562897f64086bcf001d5374da81c809d6e4
SHA256aa93d0e123e28ac3401f81380c403ccfd39c28d921cb388af4319ebdc6a418f7
SHA512b2378b6bde78fe4901a03cfc6f3f3767e108c00bece9a0fc2be18a83d85aa0caf06d92d6b02c31fb3e53dd0bd3fa14aae73bf13c51ab240390f905a77b97cc5a