Analysis
-
max time kernel
77s -
max time network
77s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-11-2024 20:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1d5zE9AEjbUKXSOswJ2TN6TQky8XsR_9p
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/open?id=1d5zE9AEjbUKXSOswJ2TN6TQky8XsR_9p
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 6 drive.google.com 3 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133759171997309401" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4140 3812 chrome.exe 77 PID 3812 wrote to memory of 4140 3812 chrome.exe 77 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 760 3812 chrome.exe 78 PID 3812 wrote to memory of 4552 3812 chrome.exe 79 PID 3812 wrote to memory of 4552 3812 chrome.exe 79 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80 PID 3812 wrote to memory of 3572 3812 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/open?id=1d5zE9AEjbUKXSOswJ2TN6TQky8XsR_9p1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff95b2cc40,0x7fff95b2cc4c,0x7fff95b2cc582⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1700,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2364 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4700,i,10747175572324801762,14153701067127454461,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD577373ae6c931878444077c8e8a08c4ad
SHA1f4912901972953a208a4bb207c1484c2ae6e29de
SHA2562c5ad67eb683e444f2e9786506a1ce2b428f197a27366ec6d9af94a13cc7195a
SHA51279839f7685ad487d24febc074af46e9e0c1e7f2af654fcea200e44761ca277a4ba9dbd732bd94963f772428e520c10813758494c9f02070cc3341d530e012cc8
-
Filesize
408B
MD508bdac16b15ee898877c10be8b5f23cf
SHA1dd513a8530c8c86a918db404123be46102487974
SHA2563d567223add09ea6313eafe2cd64f7d6cce296caa1af84abe110800adaf6acae
SHA512a64b5319596efffe3985e033869062d2db22ebe7db4d2bb2559eb29246ee5fff5484746c09989facd73b20b94d5e1129f918b1e8f30058bc4580ff7f9f967b78
-
Filesize
5KB
MD50fb5c93417987c3a59a2413970739abb
SHA1b231f619df10d239e2a0ae1868e490ba635884e9
SHA256fbf31c1001fba90214cc19afd86e4bae9686a1373c2a79f6e454da952f419234
SHA51202aae7c586dcf29ad576ad4e0d35ac79ce2eead0a634f47caee270446acf3697dfde78dac34c68679491e2342b687d2dd3f14b28196793943e306babc66b657e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5c7d3a531fb5696ecb78dcae5aa98c2b2
SHA1638021d2693bbd94f5e6a3f2193ed337d0a0b417
SHA256f80b0a90cd0d2efef087817a4199b6e0fb611be9514110d68523192e71a12ba3
SHA51237b0f164e67c27088334ca58a7df4207c6d27eee766f59d385d22091d9524224bd4c7796b50a32405a7c647f8845752e1296527558ea59be21d649110131d24d
-
Filesize
1KB
MD51b4762909942b8f3db703fe38b76bffb
SHA11657e4be908f81a2603d972cc8ef6cf4976c5a90
SHA256246be96000db4c173b28b690490f9888c6fca402a3bdef752a0eac085e0b861e
SHA5129bcd85c55a806aa8d29688f5e05ad5cbbcaff4103e31decaab3c6c33dc0d6d5c6889a8924dfd66b00f01ec49da976830e7b29172fe57d601f501aec7cc5d28fe
-
Filesize
1KB
MD514c188bd3d6f0f4ad433410564595494
SHA1084001331f8d567c63f9a1e365c77e738a0c3308
SHA256413783d9604ff78cca64eb0a34ec93f34c79d5d77d8fc9bbaa3791e717bd2863
SHA51274a8807863df21c9fb456de7c90619bad59b5852afb37526c640308090067898db90aba5905073600dbca5920ec6c2eb88cae758d6a135c3c42aeff7ab3e768d
-
Filesize
9KB
MD54099960bd3473fba08e0403fe39ea835
SHA145f7ff11f1745693402ad8b4dc3d632d84c30c86
SHA256f97bdf9fad907a2c667a0fd763750297a65aef9462799e5d304c1a585077b530
SHA512a83baa4d659999a48e31195715e873bd7f0ff3571ac75674c7d44a10a5eb3ffe74c544a168bfdcc96aedf67276f14e6d845369c6d47e67ff7c1e965cfb788f62
-
Filesize
9KB
MD54453403a1e7e5ee8455873cfc0569974
SHA1f1df663b438abd53d475bc794a6ebef4938f104b
SHA256036c7effd36ba0edda3552150accce95404803eabbbef84d4fbe91470d4653ab
SHA5124519d5fb4f8aec20822fc164cccc7a76d22a9522694df2d58fec2a71eb3ade9b95a3c9458ff406a6c0de457bd1ca4b1b3c5fc47d337ba81e5e67f7088a336ba4
-
Filesize
9KB
MD56353f4bb3f708eca2019e8cffb1dc4ac
SHA1107ae4b7e9ac887c6376e7bc2afba432bcdb7269
SHA2569398737aba66875c5bfd52b2f94c043a854878c1264cd3912e77d07e57c1709e
SHA512d0311a13cccf92af7491d8c89f64918dbee34bfc4fab5660b66435ec20935ab5c961c3605a67ede649f1a1fa02e82eb972049c305ef8887ac8b5f099b53d19a6
-
Filesize
9KB
MD50e872991b8957b8269ef1224c7b00c1c
SHA17db431e1a461278e4d6a33a49685696964f76faf
SHA256a7411e09142d260431d7970fdb21ca165c9534e9dffe98ecae266512fba2b883
SHA512305db2ba798d6bb272b501c2fc227d86163328d72994a90ce160eb554d16672f30b476a42dd4f1d215f74b6a188a1db8621862383d3352bcfa3c431dae353d44
-
Filesize
228KB
MD5d1c12899e6d41713dd1199c3f74ae656
SHA18b1881e30a6ed41babdd1dbd2039f7bf68920ab5
SHA25677b27701ba3fc5c14461915cdcc67fd93d2afa78eae4937c9eff0115198e0f88
SHA512d9f2ab2a9c9bf0166a1d15abdbbaafa1252dc042004445bc6b98eac3dc17e60bd47f0108c2572dffb2ed5bdebae46140d9dc9dd38e2a943abcfe7d0c29fa9a47
-
Filesize
228KB
MD53278b6e54baa209ea4799346549c053f
SHA16eb2be247f1912cd747208e9b39fff47c2f59301
SHA256305db8f6d90d03ac03df11b4bb9d96ba16f04aab1c7239a1e9a401783130d9f2
SHA512276be4debffebb52f206adeea2e86bd78745b6ba709b0375335629e5ea07411c9a19a8f3efd37e0949b7c0ba51fec76473f9768abacdacb8b8d7ed7d7bf971d3