Analysis
-
max time kernel
17s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 14:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1mduJkgwGFnyB7hE4PSOaxuR0jgdEzHH-?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1mduJkgwGFnyB7hE4PSOaxuR0jgdEzHH-?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133761562843873503" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeCreatePagefilePrivilege 2932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3020 2932 chrome.exe 83 PID 2932 wrote to memory of 3020 2932 chrome.exe 83 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 8 2932 chrome.exe 84 PID 2932 wrote to memory of 1976 2932 chrome.exe 85 PID 2932 wrote to memory of 1976 2932 chrome.exe 85 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86 PID 2932 wrote to memory of 4832 2932 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1mduJkgwGFnyB7hE4PSOaxuR0jgdEzHH-?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa6dc1cc40,0x7ffa6dc1cc4c,0x7ffa6dc1cc582⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,6976981255832810115,17173855841969531722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD527da35677ba628cc49d76d3039984a1a
SHA1edd0b2d87cf9611d7262ced3ed880588a029900c
SHA256355949dd5460918247a2f192f715bd5de0ad94d325bc05f80a98374e7b88c80f
SHA51205328473da252bc05c59bf42b1570766241679cfbba267a878b81e1d974448dd2a8e5e7ecd1bcc58c1098c700e2e28c46bc5fc51fa936be4f4c06ebf52a62a86
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5108340acc7cc5f951b903e99fd256276
SHA1102e29efb6322d45986fc891e36db6b35ab66e3d
SHA256d13b8ef1036dce1fa3913fb7e7da6077060563deb026db027ad027eca8ba45ed
SHA512c663ffb08657d771955bebc4cb4f41faf4a53c665de6b9ea944f637eb6ffb32849ef517ed6c68c2f9f0e660d58fd1d7ab8c0fedc0b5ff3b5d0c197b2f0a13b83
-
Filesize
9KB
MD53687ba749df9a1cecdc8ef79c576bd35
SHA13db0f9c2c5454c243e25330254f48eb23210ad4b
SHA2565254faa980f1ac685439390c87365abe379001c9bb69085bbfacd8762bc33185
SHA512c62c00dbc523da5b65b7780f9e01c9feb4adeb5e53d5e4a3691917805e78cda2804da10e18269edc1edbff8242250e9265c74e82fdb975d6125e080c70b9645c
-
Filesize
116KB
MD5a9a77213cc705febcfeb75d37009a85d
SHA19dfb4a26a65e6d1be335f0c5c114ff159996b239
SHA256b16b4f323774bb7f67e997679f6812dd9650023e06e8e5d79578128fbe62bbe4
SHA51230a7d6b6630667db22e42d757a8f1efa2f4d21357406a2902dc935113c0b43df67c1e8d317348fd4b39074acc6d5d2e3565e6c8b6fb54d38089af2de144c0d03