Analysis
-
max time kernel
12s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 15:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1tGwFFos1HDisuYXLRgd2CFD1G-0aRUoO
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1tGwFFos1HDisuYXLRgd2CFD1G-0aRUoO
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133733068060126430" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{25FECFD7-EBD6-4780-A11E-F237AB2CC9A4} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe Token: SeShutdownPrivilege 1968 chrome.exe Token: SeCreatePagefilePrivilege 1968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2896 1968 chrome.exe 83 PID 1968 wrote to memory of 2896 1968 chrome.exe 83 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 1140 1968 chrome.exe 84 PID 1968 wrote to memory of 3796 1968 chrome.exe 85 PID 1968 wrote to memory of 3796 1968 chrome.exe 85 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86 PID 1968 wrote to memory of 3400 1968 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1tGwFFos1HDisuYXLRgd2CFD1G-0aRUoO1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb76e2cc40,0x7ffb76e2cc4c,0x7ffb76e2cc582⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1844,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4512,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4572,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4528,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:82⤵
- Modifies registry class
PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5088,i,14157518746884108082,16264609708002338069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5b338de189951fc27e615c495157c3ad6
SHA1fce97d32831e328ea8157926444fe2c9fda46d4b
SHA256610e9462b6d2e0429eeaf2cb3d75c3a80c73f0dd6a6a9e9f2d3d00c5745ad37a
SHA51242967426190d48c9dee1db8403c321c1ddb851740f62fff22124b9582c41c2092211065a1cb3dc4a7631e6a99f8345464c6b76dd570d5f3ecbc3cd5b040f678b
-
Filesize
9KB
MD54ef9deb51abed7cfe6ac575d0844a990
SHA12f4c4f536c41c6068c28f8f4a1a4d04a5579fad4
SHA256763bf9f10547ae1b81459627ff309537f3458122814a493fa700bc73b90c43a9
SHA5128e925760135bcd78992636021050d5f3736b2bd74d115671e55cdf4dea227eb9a8d9f4e605a42a91aa3c65ba77cef4a5371cd67ec08184c93391ebdcda61bbd0
-
Filesize
116KB
MD50fa898ba341254fd1225b6d3277f7b0e
SHA104c6fda3bdbc25beec8348e1e8326b5a1d8232fb
SHA256d7418b45cc3050291607f47e3831bd239b3eb06ab647f621e9ab16f60c9f0ef8
SHA512ccaac3d18934b6a627419727b484e617598cce58606430bc5637e17f90f280bd4d32169714c888688d8ce1c8c0c152f0cb61dfa415571cf8b1e38f30e71e1e04