Analysis
-
max time kernel
27s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-10-2024 15:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1sYI_38lj6v7gwa3sR99r2geIY0gajCxc/view?usp=sharing
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/file/d/1sYI_38lj6v7gwa3sR99r2geIY0gajCxc/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 3 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729604091903439" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 chrome.exe 912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 2760 912 chrome.exe 77 PID 912 wrote to memory of 2760 912 chrome.exe 77 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2772 912 chrome.exe 78 PID 912 wrote to memory of 2928 912 chrome.exe 79 PID 912 wrote to memory of 2928 912 chrome.exe 79 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80 PID 912 wrote to memory of 3520 912 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1sYI_38lj6v7gwa3sR99r2geIY0gajCxc/view?usp=sharing1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc08fcc40,0x7ffcc08fcc4c,0x7ffcc08fcc582⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1976,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2968,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4348,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4372 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4500,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4908,i,16379459815862439231,9701560880231765858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD56d8da023433caa7f90203578741a15e1
SHA1dc9ac81565976c9414bcfc878498101558b8f679
SHA25644058b276331ef5f314c5112b34a9390b7d9dfe0df0b3a3e052a7223e7cbf02b
SHA512920a87e78018fa9eba4c147f9ba8f94d472344b099fd6d8f78f57f0458aa89cc675402e221e722c430847fb6aeb6dca2fa1e02a891c898ab90d745addf6306e0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD56e84fb9fa79fec786c79fba1037091ef
SHA17d197d19de1e82f971a4de1813eb8f10ca487f88
SHA2563e61f88c8a39753ed9e315149a0b24c5f81a571607a67b1702d9750d35b74991
SHA51268216bf8f2e35ba37184c20998f122ca4ed1f30c55c5059c7b0f325dbedbdce7d055d165cbecaa729e880d2463c681d87e0a99c5c6e8669cd03b0a6bcbaa254b
-
Filesize
8KB
MD5ef1b6b07c99d53feaf67c6f301c4508e
SHA169e3b8e93ec137548573cd5dc9cd376e94149cd6
SHA256343f656ee98934319eb9b3015d49af31d829f7688a538a88861ec8b1f148b9a2
SHA51298da9cfbdd92e37b21aab34429c083b07c55b152a53d9feb09eac8efee3a32b38b825bec2afe9da0ad9dc0dbed1dcf53cc448146d995639fa68ed81c56cd81e0
-
Filesize
9KB
MD596758d646101b8ca1799d6ed822dbac6
SHA1a55f2cfddacd6783f02aaa9249127461a0283a07
SHA256b998a9bfd2f3d9ec5bb41e9c4da30d008099818da9358b549312d73a07c6845c
SHA51247be676efaaf583cf55ad967117dd710b1e3b8c52b6e912bf9cf44a04b6b0a92ec4e33ff2266cec6c8ab50de5820c4c36f7b921baef05915c450bc4892fad94d
-
Filesize
228KB
MD527c7eae28049bc52ef9bbbb8dc5cec9a
SHA14125c398ebb0a5ba30a6531feb2299f34354b87d
SHA2562b1f2ecc4aeb5d8252c2d84b82a165b93a24d315bf3e12b5e3c3a47103d2cc69
SHA512e9e1ee3ef7fe435eb7c936402e99d831cc178ee4c03b2de51ede501bd7c7a50e0365ba99b3d42b5b0b7360e2290be0ef1347ca7c4ece26c55eabb31b617f7537
-
Filesize
228KB
MD5acda72292a68c98ffd0a0f24af736fdc
SHA19cb2eae843b7ead7f638b679e5e72e63114cb322
SHA2567ce9c73d6dbcd6f23c00d215e8af51e98f7360c61e539a56c8cadc94d0e392e4
SHA5124707c0c3827c644210d22f5f59d9e258a6afe17f5fc522a61e51b5e358d88ca12e405870da5b00cb9ce3d0f6392b045b1f2dbfa976b27607135128836f76bc97