Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 17:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/15Yz4z2zTRkIolH4dlpE0iT2lCyIZHGUi?usp=sharing_esp&
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/15Yz4z2zTRkIolH4dlpE0iT2lCyIZHGUi?usp=sharing_esp&
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133734876170149170" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4089630652-1596403869-279772308-1000\{437CD50D-C1EE-4981-BD46-5BF338A6502D} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3028 4948 chrome.exe 86 PID 4948 wrote to memory of 3028 4948 chrome.exe 86 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1784 4948 chrome.exe 87 PID 4948 wrote to memory of 1896 4948 chrome.exe 88 PID 4948 wrote to memory of 1896 4948 chrome.exe 88 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89 PID 4948 wrote to memory of 2508 4948 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/15Yz4z2zTRkIolH4dlpE0iT2lCyIZHGUi?usp=sharing_esp&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb6b1bcc40,0x7ffb6b1bcc4c,0x7ffb6b1bcc582⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4688,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4700,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Modifies registry class
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5060,i,17370929537995808720,4348253723660129734,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51405ae57270ea8d8d9c0cd3486cb4aa9
SHA180b480e7ac26e31643b27754553b741a867c64c2
SHA256f5567afeebda08e4c23f7aac7d3eb043737a72881022a16ae5ade0437a1e5b21
SHA512e7afb526e6d067cada584a237789629a817e4ff873fefb41b0f7c4af90ed36393610761758baf353aa630f4f44aa2758ad59ba6523adb912402a031521f0b1ab
-
Filesize
384B
MD5b77b5c82971324d6dd4f59c85e4b6184
SHA1065342f9f7e08086395a90d9056361a28334acf1
SHA25632b2c84d211e833ec8787c5274a72c7b6b563a6ab4292eac2a5e923459493a74
SHA512631d93e6c11ef4eff59dbcf8bc0a62bcfc25ffa0fa9fc2a03f98a501f99cf3daee1bfb63885d9b97a7e899336301473d90ced0754e6281041e105366c3f4a0a0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5f31ed1cdb42047f15662ebe351e1bda4
SHA1c89e44ae76627b4b3c9cf67857ec8799ce708904
SHA2563f6994432a118f31c116ac311846eb9f609c67df2a1350dd6972a009c32160b4
SHA512e30162365c7c11a2eb0e260f2c7e480903a3ff4da4889c2a733a7ddbb3c9eb39b48028a36732c7c766e5da44c30349f499775fd0aee62d823d02ae33654fd633
-
Filesize
9KB
MD5372529960879c0212c011c198f0d69e6
SHA198b075ffb440e4e190814f5470213fb6947f6988
SHA256f1133055fdf46e0edb17231eb18be9c6b8eecc5c23ffd774088fc822340e879f
SHA512cd6b4873840a71a39f49313a4a0481c7d2bc819a7de3f8137d7f2da2e6ba3d836eb541b61eec4262e37a109135e11c3fa5e2a96ea0706f1e627c8dfcbc110450
-
Filesize
9KB
MD581875893effef9e76e97c1ee5d6437fd
SHA13d96bac6cc2c486afe56fee7313d87997bd2b80f
SHA2567955365354af6d021e2f0091db8e07274449dfde8889f338bd8dcbaf5513e924
SHA51297fb517f0ce0f9a0557dd43b403576221d8a6bbc008b8fad761a591e08a98b3f595d580a12d86af84526d42096d11cd5a130c97565806e44704da3ccb535f90d
-
Filesize
116KB
MD5aa6f3a1932c2f97aec69627a75a6199c
SHA1c4b98f08a1ff7436aae57d32df58dafda4e1db07
SHA256bab9d2a67555fda1b69e8dbf56c7ace503611e614c4231e939bf2ac811f0a424
SHA512e0529dcf2a84089142298bb94ea0dfb2d2d68c549af5a06ab3aa343682cf0f180ecd81d27e2b027346d5de7baf5429805c960690a3c770487697ccd6b80aff9c