Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 13:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1mbdRn9nE_cNf3SNDzXMmkcO-MCvwoxiB/view?usp=sharing_eip&ts=6735272c
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1mbdRn9nE_cNf3SNDzXMmkcO-MCvwoxiB/view?usp=sharing_eip&ts=6735272c
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133760634753315726" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3332 4912 chrome.exe 83 PID 4912 wrote to memory of 3332 4912 chrome.exe 83 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 8 4912 chrome.exe 84 PID 4912 wrote to memory of 4376 4912 chrome.exe 85 PID 4912 wrote to memory of 4376 4912 chrome.exe 85 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86 PID 4912 wrote to memory of 3412 4912 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1mbdRn9nE_cNf3SNDzXMmkcO-MCvwoxiB/view?usp=sharing_eip&ts=6735272c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc05dccc40,0x7ffc05dccc4c,0x7ffc05dccc582⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:32⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3116,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4832,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5132,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5336,i,873867548023266688,16312204331400840302,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52deea21d4a39f4455528e4d668de2ca5
SHA1fc9ee337c543de55348ef1be8eb12cf0f28cf503
SHA256d146f804cd729eb3131cf69c9fbbc7a10e7ae5083cf0a2f326a3e396762e9726
SHA51253aaab88729deaecce8a91c0ccfa7ba1aaf10b3330d32a974648aa8a22d02960c03b1c6c2d454a1fe01384b6f39240c3a5f8e953bd4012865d783ea2cca84086
-
Filesize
360B
MD588b46f528fc8298c9b465b1338ed008b
SHA1e42bfe775ce1419774e95ed6cf954c46f204e34e
SHA256ed79b0afdc69b38c42c8b152301e5eca5e93281ba66c5d59b80ca42e115b0aef
SHA5127d852ce157c45df8e8344113dc9025090318156bf6459fbb9eb63015e0d8b8d1ce07d3da79bfefc42992f660886bd1951999b2cf228c65c4ae722ab3043baa7d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59d05d9d40f72d8c3272da9991deb5c00
SHA1663f5006ad87c53483bc48a106471aa45a5e2df8
SHA2562deabee7686d8cf77d2e9b34895795963aa4e31cf908641e0293e987c5fc61cf
SHA51289f204599afe494bf4b4537085032d8bd2927611f5e2548b94798469f7ce1604efb81eb1c6bbb88cb77a0417fb769f8fbed7a5d653ef92788862350d0f39e766
-
Filesize
10KB
MD5d41a86ffebaddc76309c39ccc4d250e6
SHA15bf307edd29d8253500acfe5cd77d0e04a3c14e1
SHA256b398b77a70327a7aa5b5807fd1b096b3e70f528d4be66c7f782afb6920928bd6
SHA5129dc33a713aceb1f82cee2f7c4d143bb78e5d54507ab9903b88c86bfe7984561da91dc2561491433202b9a17785a6bac2288c05991bd71522f668069924149ddd
-
Filesize
10KB
MD5f1d3e3a78602071fb49982cac5465218
SHA1ceef4ee0b151c69bec8f003475b4cc3f666a1731
SHA25689d9164f5930ad7a5cedc7b941bc12326d582150515d4811f9d551dc3496b00b
SHA51243f935a8a7dbd75b075abfad42fb65ed08fe1e71cd2514b8abd645841dc016975c52295d10a7692867861faf219c555ec8058ef7eb279ac7c209c7dc796ab9e2
-
Filesize
10KB
MD5532d04ceccca163096ce5b952a0f92d3
SHA1f119c605a4acb21bbc63ad8a11ddf3041b79558c
SHA256501914643d618c7365ba224be84af1a7057cea1e06679ab8ed03349613eb0b53
SHA512789473a52bcf6b908662dbece4481d57cb1dfb0d5944078f0fa2b955018cc51a8c832206d825b0b473a2ffd4fe72af4b0a8cf5396e3a99a9bd97db7a0b899340
-
Filesize
116KB
MD54e609f5f7860ae2729a4f923ca2b295a
SHA1723c47774a85cc4a50b3cc65f0ee8a11ef782ba4
SHA2564809d3705bfca5c7a09512ab0e41d18e49cd81f12a06d96d2d9c32db417df9e2
SHA51242175c5ad36c4de65ccb1714436cc869501cbe9c4c64cdaf3ee27b5fa4dd0a6e26457effeda7e1be3f2be9ae2b2b17c3fa51e52ce25f2de1ffa7cfb0ef28f710
-
Filesize
116KB
MD507fa7b045e736fdac5074b9a4ca157f3
SHA1127aba99839ab179472f3ce82db06bcaf171a5e4
SHA2567598ba0cafe7837fdaccdec781c8a2954581b21c5befd7354eeaae5e6110b864
SHA512ae128ee7d706fd0fc9dab2fdf54431642ea7faafa0eddb67a605f0c1f80c8ea3c2e9512346524fa0d0cf02052647f90d2788a20ec6be9677def3671f018b8e88