Analysis
-
max time kernel
41s -
max time network
39s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-10-2024 15:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1nhSX7jKIBp-B0VWnh0tXJAuysYB11Rza/view
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/file/d/1nhSX7jKIBp-B0VWnh0tXJAuysYB11Rza/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 5 drive.google.com 6 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133739105197520862" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 4436 4200 chrome.exe 79 PID 4200 wrote to memory of 4436 4200 chrome.exe 79 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 4344 4200 chrome.exe 80 PID 4200 wrote to memory of 3940 4200 chrome.exe 81 PID 4200 wrote to memory of 3940 4200 chrome.exe 81 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82 PID 4200 wrote to memory of 3220 4200 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1nhSX7jKIBp-B0VWnh0tXJAuysYB11Rza/view1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff963fecc40,0x7ff963fecc4c,0x7ff963fecc582⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2352 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4248,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5012,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5104,i,1516351714714833493,5860873677529445526,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f3f4fc065e0f4c36c3593310b79f516c
SHA145c8fda74eb55cf0903de97549d11d781450c0ad
SHA2566c77445650e02ddc8205666e8f8d83e7ef0358ab787f9c747d7e51ea339d42d2
SHA5122937aab1348662ea45224033b13bafb2bb93ec22a01cfd75b8eec0d9e1a7a4e0169c0f21058fb8ea418245bea5bfc5a2595eb122bf4391e2463b84985624b8d7
-
Filesize
384B
MD57106bdc7f7177dc1d0f8309217f0fc26
SHA19cac9b4476261a7d70357b2416c6ce3b32f29bc3
SHA25611dc50537c6267ea080fd226e5a43c3e5f9060fe1b0529eb882cb236580d58d7
SHA512333201c28fb16c925ab5d175945cafb32275949a339747a36426e969f83245d4dfa6629cc475846a54098637f96269d7ea04765e750f6a285da9a5088dcc1a48
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5dc56e8c536c97fba81b0abb3b1cf809a
SHA1adddfe47601196a51a2e84fdf8e132b288956b0a
SHA256c9ae3e18e47fcf1ee9ccb1bede3945826853bbe933a24ac56061b0645d146544
SHA5127253e827d3ef5447802751a9a67f9179e4fa5303af6c8ef489a308b0baadf98dc3e1d3f86adcbb291bea1b7d8883935f955372688f1a6ae482624da5b3845057
-
Filesize
9KB
MD5a301f438694f897c07fc3e89e4509f61
SHA1392cbaa72062d29a5566da6e3ec4e7268e667837
SHA256557d71da6f81e004a88881ac6019ba0dc905da3e198d698defeac6a9659cb52c
SHA512852fb482784002bb2b6185e3763958882d1d8e7b03827174d6b2213a9779e874bd7eb0cf539c9b34d0fdcebfd9f9d70128d298cc8a5c8ede219f9d5327be5128
-
Filesize
9KB
MD5e1b1777daf596ca63587251aaa2c8bba
SHA1f945828e3390af6c3f9cf0ec4a289d83038204f4
SHA2560c05f46c19d336f96b75a9eeec2c93c9da8e77dbce88b36b86751bd7348dd4b2
SHA51283a582c60f937f0e85bb0b32b9a9bb691652e5bcf6acaac033be5593b4189152d65df27539aa8b37f891445140936b277a7b565af2edf99414000f5dbae13cba
-
Filesize
10KB
MD58b90e12e0406d1405e2e1135cb4548bf
SHA139fbcf0ab37d8d45652a44a05ab0cbef8ac85302
SHA256fefff691bd909d40a764e2a46fb21e15cbc2027d7bd02bebb881e60b930c5832
SHA512866a89ac46876bb054092cfa5de0b7c405c26460d1bcac47b76e934ef229a3717021185378a91ef01b74dfbe3169014f6151f1476885d6a30a3ab6ac4712873e
-
Filesize
116KB
MD5fe4dd361a6ea78d288728c8aaad1bec1
SHA159cd1dc8f6e8382c0730d92bbb7fdb8118adf355
SHA2560671fec5454050927fad6661ec35c7c4c999397c7c6f96d0b0cc147ecb8ee930
SHA512819d78140f5f7fdc7ff72fb76510cd270d6417b4322a51e3dbe0ed09893fcb3e32535ade6e6adf7b172dc96a873cf1dc6072cef70bcac6f969a734be9eb6efa8
-
Filesize
116KB
MD5d17dc0b29950b8b6a0ab5825933f6dd8
SHA191a71734fd9584c254f79addd661cbd40b6e6310
SHA2562a0503ec728d37a5ba1fb6ad2644b4ab42f1e1b3046db40d222092a7bb4d327b
SHA512bc65ccc9f13ba8987a5db5f2fbb68c5e7cad82f592896007f04d89fffb5f3e304007ba511042e787e605248e6bbb7d35c7332924fa132b75c8f3aa6b12ed710b