Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 20:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1ettwcutwnzowpdz0su5ealoal4r1ww00/view?usp=sharing&usp=embed_facebook&usp=embed_facebook
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1ettwcutwnzowpdz0su5ealoal4r1ww00/view?usp=sharing&usp=embed_facebook&usp=embed_facebook
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133759157194257374" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3004 2600 chrome.exe 84 PID 2600 wrote to memory of 3004 2600 chrome.exe 84 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 2068 2600 chrome.exe 85 PID 2600 wrote to memory of 1104 2600 chrome.exe 86 PID 2600 wrote to memory of 1104 2600 chrome.exe 86 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87 PID 2600 wrote to memory of 1352 2600 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1ettwcutwnzowpdz0su5ealoal4r1ww00/view?usp=sharing&usp=embed_facebook&usp=embed_facebook1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9b00dcc40,0x7ff9b00dcc4c,0x7ff9b00dcc582⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4452,i,10282848501999720840,899656210806078996,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57a4fc9b6ae3a05c4815786ae4202a40e
SHA1eb4241996cca5e7a9ff882bdf9d3b723379f36b9
SHA256473679f62418ccfa50b20ddef4e9bb90606de7cd4c31aedf0ee30a6f35db84bd
SHA5121cf029d83e9227c0277d65087a229a7a300cd1b1584c60b6f765fa8906d9766a61897784882138a704092b6fd14642b2098f7f48088b26f217fe0f7acb73f10f
-
Filesize
2KB
MD572f3aae18facb7a782c75b2d4340043e
SHA1b157dc5c715045250114f9e2607ff3b366cbaef8
SHA2567297199f557bd0e3a2b52136a0f5935d09264b6cee5acbcbd81b2e98d71619c9
SHA512b0efbc6a07b39702fbfbe0752e2de538f1ad411e89e6a9f3f56745a085fb0fb42c0e08b5089b4dea35213d05af3e152490c9d5d3d007c59ed1a035aa8af315da
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5376e38cefe4c400ed4767149622ccf04
SHA1c7fbcc5392f815dc3fe2244f19e275113cf23d18
SHA256be64cf8b673809640320f8d97cc88e02384ba2fc8534b53f27e8df96ec26ff39
SHA51241c8cddd27d5939ea540c69b5d996f5c06d1bc122db765254bc5d9ee7bf40ce2b1f97aba10fde1fbc0488d4f69d9aa6a8e270120779e07f479649b3eb68aa40e
-
Filesize
9KB
MD50eee5bbdd3122ab6ebf3f809ed728dac
SHA16588afacba5b94b0bbc0ca08851f3beade7d3123
SHA256ffba34d355dedc1dd2dbd7ce025382c4fcbb50ec6629495d6a322362dbb0dd90
SHA5124390f5cf8ab2851c0307e443057d163314d3d7cb2f0d8083539e2b38abcf9c2bf540b7575a1d72d148334fc4cefae59ce87938aad30f7d129d2702b657ccf293
-
Filesize
116KB
MD56ed19efd882a805f13140efd16065e62
SHA17e10282b94009eefd2eb140689d44274166e59ce
SHA25628ded85d2d5d250951279e4e3944e52f156328e0723700124281e460ef8a845c
SHA512750228a6c2f72c1946137d098c5a8be387b55051abdc7ba315a9b6f9c258af0193ec1a39e66322de9887df9065c8d864aff43ac0782049e8e84e3cb3df84240b
-
Filesize
116KB
MD5c4825e6247325b32c721da5d91fb13fa
SHA10dc995763efdfe4e0cfe6472484c877d8c1e5212
SHA25656f7237480fc55b9a69896beb9b63dc94eaab6110222049fef7c65bc57c0ebc4
SHA512bfe9d87410a51cdf19e0fb7ba6204aeb92736c317f8754ab863199781961f1a2f547218b34652ae76ca1b97a37d0b302774aa8ea8cbbc652f93080cf96c45e93
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58