Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-10-2024 12:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1-ftBpY-a_1mLId5C19zGyq6fb7M9BcH0/view?usp=drive_web
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/file/d/1-ftBpY-a_1mLId5C19zGyq6fb7M9BcH0/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 5 drive.google.com 6 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133739871800016726" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 4884 1292 chrome.exe 77 PID 1292 wrote to memory of 4884 1292 chrome.exe 77 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1064 1292 chrome.exe 78 PID 1292 wrote to memory of 1464 1292 chrome.exe 79 PID 1292 wrote to memory of 1464 1292 chrome.exe 79 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80 PID 1292 wrote to memory of 3976 1292 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1-ftBpY-a_1mLId5C19zGyq6fb7M9BcH0/view?usp=drive_web1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8923cc40,0x7ffc8923cc4c,0x7ffc8923cc582⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1780 /prefetch:22⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2352 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4532,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4580,i,2626807327899278716,3967400998153908953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c83855a72d7cade247a878e3edefe8fe
SHA1458425b877d630eb593e0b56d363743a1acc1290
SHA25621821f72cad501d35d49e8ef7a87d1c016875940bc92293db82f5930dd1ff16d
SHA5124433022b9077c0083f229b3f6efdb6593f4461b16afbaa155660fcf83e100a683755f8c820ae11b4ed05fe61e7391669d1b0881e34258eba0130830e3a0a0d94
-
Filesize
264B
MD52c4f4af095a6763f4993dee71173d01e
SHA15e3704fde822618919250d4a8c4f776558b4e598
SHA256b2d0cffcbdc3366b5f6844db84d011db38d33003491f12e874aa0b269d65de3c
SHA5125b428c97c41399416de4d1740c8c7dfca4824f1bc1ca12809a61e0b575ef907ce6c24046e67e8da1fc4e799478ffec7f2eb0935fdff3101ac7ebde5f0d094376
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD54719dbcf21e34b7b044773f638b0b100
SHA13426368c500dff93f56ff1afe739181f5ea80c04
SHA25608a9ae4d50a967f8d4cf316192b52ae401f918e8f9c73dd9e7b7e75af5187339
SHA51293e498f1b6ba0534f241e143cbcff949adabc8e5963e77dfc745eb8fc528ddb380d65bc59bd9e6f90d42eea8cedaded16e5e1518eb5af5a5cd26e5bfb9c3ee91
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
687B
MD57cbd89849aab2fbf9373344f1d7340f4
SHA1ad08f1ec80f9401795bd0164f722ec3485a03269
SHA256db714ed256f83ef47419c28787a2d1d7a550f931bc52acdc303ade46d0adebce
SHA512ee1756bbf1cc414a9be8195731a742c0758744d32e4c37b71683a7bdf6cefeac4dd558453f2321d946375b343201008f5b056d840581bbcdbbaf3859a589c584
-
Filesize
9KB
MD5819945deb1e167bc962635d9a6f1b986
SHA1c30ee751f177e3a2619b2c778ac1d80df2879b7e
SHA2562fb7c70f772606d5563d72a532bf2df1355609357bfcf645ff1e094b14fc064a
SHA51256a867d2c7584feb8f7bf3389d04a98cb8565410103426cb5510ada22213760eb5202ee8888a2bfebfee5c9f43bc2988abab92d1091356d0ab96d9f0c48a4982
-
Filesize
10KB
MD5c713d70ffe7ab65c19035f3144cebd34
SHA119240ef575811e072dc9dc03f4c1234f97dbf049
SHA256876b9ae0bc9cc61401a2e04700762381e48cf36a79cd65c96c4bb54dcf3f702d
SHA512a901dbb0b4c96f323c0afd42f7755ee913a8bf94a8171bbde98105a0b95f4d1c1d67b86fd528414abcdaa82052117ac41b4cc5e0b7d79059dea2f06819b7b969
-
Filesize
228KB
MD5edafe01423aa501a5639b0dda009e10e
SHA15c459d1d0e637509a9f1d53956a6acfb2b39f830
SHA2567d25caee9e5d7ed11301a20af1ecbb51e90760670c5801ae618558bf47f4b2d3
SHA512a692a8ef0a1b25fbea2d300f6d1b8693023273ea460bcec35a49c31f620d4d4d4da882006a532e136b9f54b909dd9c772783598cf1418aedf248c2e0d510c4b5
-
Filesize
228KB
MD5dd5e9c0ff71e57549dbe85e815978981
SHA1f591053d9f89354083c2c2e8b4fcf4167c256c01
SHA256363306f8c0f8e610480a8ade179973823338875849ccd9c91fd7cb6671727401
SHA51214778708c7d175c5876559588c299f5226f0da0e7c95701621027e7c168e244e68bb999721f8949d479dd70568cde936875bb802ccbe9590df5df30fa906861e