Analysis
-
max time kernel
60s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 19:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1l4pI-yyEUil3nYGLxllI1-SfA500Qyut
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/open?id=1l4pI-yyEUil3nYGLxllI1-SfA500Qyut
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133758274693883373" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe Token: SeShutdownPrivilege 3512 chrome.exe Token: SeCreatePagefilePrivilege 3512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe 3512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1976 3512 chrome.exe 83 PID 3512 wrote to memory of 1976 3512 chrome.exe 83 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 4772 3512 chrome.exe 84 PID 3512 wrote to memory of 5096 3512 chrome.exe 85 PID 3512 wrote to memory of 5096 3512 chrome.exe 85 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86 PID 3512 wrote to memory of 3628 3512 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/open?id=1l4pI-yyEUil3nYGLxllI1-SfA500Qyut1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdfe85cc40,0x7ffdfe85cc4c,0x7ffdfe85cc582⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1756,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1752 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,680006034413911643,5669146136234506952,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD569e2e369c7b52614336d1a178c1feead
SHA13e68cfd9380dd1ec58ab0c398eadc4c7c5ab16b4
SHA256a0ebdd39afbc605166e3a49d743f6bcae069caf647adc86eb76746d44aa67ae1
SHA5123ede08b4b66a89a854c5b4a05085c9f5017dfb3569543d727277816a5f7d806c6e6653eda6af28eb79d88b55ab7396a87bfd6ef685c268093ac926811abfb025
-
Filesize
649B
MD53f33a057ef7d6de4034cd0070a9075cf
SHA17c589ba60616582c17d60862d9222177a5e5a1b7
SHA256fdc915bf74212e211fa2ae518cd825f4bb2ddcd3f6cf7ff050615e19acb1efb5
SHA512ba13e2b6f375b9f99220d5a7e406a9412b3c81f8d5ff3dca9e1fe166e4b8f336d4193da69da55a0c28e554359def9743abb662e850fd5eb311de4969c1618dd5
-
Filesize
408B
MD5da05988999de6a649a49e9622efcf247
SHA1c183f3c10eb780b897520113b5ba8539caa081c9
SHA256eb059c39a86adf789c35a9cf10beb88a1a61e216be3dffb2d30e62d6b0d4799c
SHA51260653f938616abfb68308abeeef1b57a5e1dda0ae141ce2b17355299f6e6f9e4b84ad3a42db18f85c8350362e80e1c82683edc3fcfa0c16ff0170c1306dc23fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5eecb20d1e5a757b84bae3fcd770da5d6
SHA147750949d3571e14245d18de6bd6f3533e7254f7
SHA256a2717c23909d6bf762e5e5976d1acbf2d613bb630a4013482a3de673805880f5
SHA51246da3c627681e65b6ea5159ca5002070102b3bcdfa5e91e7ded1e2adfa83fc65b7f189dbe65e54d94a11133feca628ba52b50317a68251847ac6b465ff487057
-
Filesize
9KB
MD5da331bdc489a68d10dc6ae0ac2206542
SHA18178ac9be8e2742c1916a46a5908593fb5835bf2
SHA2565f04e20fecebd9e0d3e48a0c62742fe6c6c5b319ef66b50c57e0455ec6c0b854
SHA512665f1e82d7593eb33c5752306d17bb1d423749d5c369c10286109f6f00c693f2980313cf71e85a6f7c29b521992d50eaa931aa95eeb875f59232ce78b9dff299
-
Filesize
9KB
MD584dbaabaee5d626567a70e368d0b494b
SHA10b05cd3f7a7e345b03547f510fe4b814c04367e7
SHA256fd42d10a9e2a39922fbca0e313c9b30f5c71cb3c3795142b5c7ff5a4fb9d733c
SHA512ed4905c752fbd6395668a8513cea4eefc378fb9a0d66a33f47b07690415045d6be15b83dc8bee46e93eef0741f5201a6a3a6b1caff24db06c4c91c6fb5d0bd95
-
Filesize
9KB
MD5f82f30b1f9a3557486eaab0f42d8bca9
SHA1ca9a174048d64ac9561f09479d922615e19ca85e
SHA256b7b047f43a767878b16c1fc45e0e29f857f8f126adb7126677ac6e6c0431bcb2
SHA51246378fd940f1a2c519f0bcfd5bd343fe8f4ab5b362c167c570baf7d0f06d8933a578dfc9c2ff298edc5be011c09fe89a35b785f5a65aa404ac0a953bd928fe02
-
Filesize
9KB
MD5914c3b1e55595bec179f0a9d904dd6ac
SHA1ef6b967b86d35a225cbdf194796c36818d4cee61
SHA2563e507e251700d1fe01805e0f3bda46fd0692cec739fcb1dd2fce644b87035409
SHA512e8b247a34ef7bdb7df96d8b4123958d2ae94131d0cc0efd5c769b61baa72e3b07ffed018a24fa3e68feb1f57502b31995d0b7fee0e4dcf6c33de371845c3e025
-
Filesize
116KB
MD59abc6aea0f93ea929d9e5a965bdd7ae8
SHA1dbae2ff83838aa2bb81e27b9e50b942118733e59
SHA256bebef11c393bd78cabed4655d3f5ca9096549abc22a6300205d00911811e6a2d
SHA51226e4d29ee9e24b2376168d1226451f0c920e21a8bd74733709be042052c538d82929b208da88972705c28c354b83b5381772091a09bd7ffa2a9f6f1ef5fb1817