Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 15:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?id=1i3gdi2KTYULOsvXHrhXhhNSsnTKarFXh&export=download&authuser=0
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/uc?id=1i3gdi2KTYULOsvXHrhXhhNSsnTKarFXh&export=download&authuser=0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2348 4832 chrome.exe 82 PID 4832 wrote to memory of 2348 4832 chrome.exe 82 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3516 4832 chrome.exe 84 PID 4832 wrote to memory of 3168 4832 chrome.exe 85 PID 4832 wrote to memory of 3168 4832 chrome.exe 85 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86 PID 4832 wrote to memory of 1436 4832 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?id=1i3gdi2KTYULOsvXHrhXhhNSsnTKarFXh&export=download&authuser=01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc4726cc40,0x7ffc4726cc4c,0x7ffc4726cc582⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:32⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4656,i,16267763048402428590,15832080757306365110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4672 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5116923b8a297f7c6fc1470d78da6b517
SHA1b396f60f55afeda96adcecab752f6adb7e00902b
SHA25666a43caee5bf46ec603f93997540e1f29b7f0c14034625c1378b44565d1f4072
SHA51204fee7034b9d205ac4a868db1030f8962991c696c6894b833c22c8b4ce42e39b0f82fbd58ba4e0f30f4f0a7f76b34557ad1b78ae9394df7b21836ff0485fc9e5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5fdfc745c148080c12680d14340912fdd
SHA15838c9b8eec8ca16845d2671784fb7c01643ba9d
SHA256212d4215f6d104b87a52ae31876017329bbb1ce44ea72191d2c8d0efb42d03fa
SHA512fef3852b5454b9528b9b8f0895e20cd5ba99feb413b3fe659cf2d241c05f325d33b6374dd4c309b2b4fed7553ee017c9747bdb7cbdf1b28dac6fc789b6124c82
-
Filesize
8KB
MD55220066ea6cfad04508dde53dee15769
SHA13572f3524c939d0d36db4284ebeb3bfecb171cbe
SHA256937d82c8c9fe1ddd7ab4d27aa8c7d21dba11de4987b6c5dd31a9f7910b2c41e1
SHA51246503b4fff60c19ec7c0cf0d3b9833f5c14783a5f1428784c5086b9c604ca51b49d11a2eaf393a0fb764c553b0c47139ddde6542d1af92f72810127916fe9ee7
-
Filesize
8KB
MD55a1e648cdcda05c869807fe82a722718
SHA195e6424881d9beb7b346f53fad4891928850510d
SHA25653c77a075efed1ed5cd1f710ed71ed4999ffcb2f5abb9fa7be6d9a2166bb888d
SHA512c5af560608f4f4d1778d520d4360bf13cdc8974f1860970e9dfb43be92846c80e6239acccfebc9e0aa52585dd99c051fef5d4f56567ee5ce78c7e2bedf88a600
-
Filesize
8KB
MD5926aa7081ff986954d0cf8293d7afccd
SHA11b5dc090f0627e1c693ee4ebeeea8eec6d1dfcfd
SHA256cfed18fd909f73ce58fa1c49790b7410bb124acde57f7fb657bb3c12dac84fe5
SHA5129326b5e71b9f460f4cb9e807cfe152453fa3b1ea9acfe45fb02dbe194c4ac908e387010a75460c0472056e5c7621c643c58c876f779b1ec3bf57ec073dde5c65
-
Filesize
8KB
MD5a33b65a75214205e6c8c268591700e09
SHA127ea473e39878029e1e1eed8f3d8533feaf4d524
SHA256186a96d211494600a937cc5af1eeb365abd1dcb88929084c79d21233827a60a6
SHA512011451add185da2074c7ee0321211d9ad2a7559c46cdb3f0583436d5cff9f40b18922e6c7b2e0ab25949cf399dec903b295a6998ec34c9bf1f419b2995941930
-
Filesize
8KB
MD5b6754b27cb87613b079d6ad52cf61162
SHA11dd0a129febe683013da4ae1e89b3920b894765f
SHA25658bff6159f3c83c9b503d02c2062346eb3a9d50eb4fb2c3cd783d5dc8abc1693
SHA512f468047b918c2bfa8586546ad3c17dca9ff0a250755fed38ae4f80b43001334ccd88c248f98ce9b92841e5bb7f9bf7a7d4ebdb35d0831dbb4c2d9c29e56042dc
-
Filesize
116KB
MD537b3aa8bc5ec9c3408b4ab75c61ea8c9
SHA1c628c2ef5b8955eb51750f2441ba67dbb4c8526e
SHA25657b32b632594e9926212b482fb2889b945a4ce97a2d147522648f172049bf9ca
SHA51258a87e0f7bd93937c677d39ea7b99a02d812cb0739d28046be1e48bfcd2d9e33355e869a49947da5f7fd71f024a1701cea64c76a2c5dffa29cad74a0cc6ead44
-
Filesize
116KB
MD5a75ef0f61f6e778956d681d5f4319d93
SHA143716195b2a3231019f1e2f0e993d339d2f59a99
SHA2560b59e4ac7514eb1a065f9d2ea4fe437d54d1c8d962ef935b68ca6762728dff08
SHA5123d092ff57239901fc43d1002ef3610717d839fcfa5778170e94b681b787cfa63a830f0b7e24cc9e0aa2d70d7b6cb75a7e0a5243d59d042933220db2d7c5d6a78