Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20-11-2024 16:19

General

  • Target

    https://drive.google.com/uc?export=download&id=1sr6IAHJffLMMTLDOaXQNudqWyC7q5MqG

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1sr6IAHJffLMMTLDOaXQNudqWyC7q5MqG
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffba55acc40,0x7ffba55acc4c,0x7ffba55acc58
      2⤵
        PID:1684
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1924 /prefetch:2
        2⤵
          PID:852
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2260 /prefetch:3
          2⤵
            PID:2632
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2452 /prefetch:8
            2⤵
              PID:2484
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:384
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3200 /prefetch:1
                2⤵
                  PID:1004
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4620 /prefetch:8
                  2⤵
                    PID:4140
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5084,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4872 /prefetch:8
                    2⤵
                      PID:3292
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:4716
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1948
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:3944
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap18686:174:7zEvent25952
                          1⤵
                          • Suspicious use of FindShellTrayWindow
                          PID:4076

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          42367c42eace6478fbd929cd3ca081a0

                          SHA1

                          9cc9e28dfe6b5d04e4e6495aaea9d7508228c210

                          SHA256

                          d6624aa9c33cb01e8bde290c99ce1fad63de26234af1547104d94efdf618a91a

                          SHA512

                          93c7fc7ac6b3c9dbbcad4e19bccdff359332a45fec41afb759387c6fb6dc34bbcbfa91b85f9bbc98a2b25f63be35dede9fb6e8fb454d3932d1a3413484b7c181

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          520B

                          MD5

                          cf18dacb13ee881bc8cb9f6d3a0b29ba

                          SHA1

                          8ed34bc2f5164cfe0c978e79c931f4c11c6491f8

                          SHA256

                          5adbcd4a01f7f1cef3cfcd7146e0737fd741e223c307b26b6dda18bce94d8665

                          SHA512

                          7efd99213e0e545062adeea8d6055bd72298d9f48d5084004f98aa47b2ba51f26bbe8006d7ac54661377afd21713b68815f267baf8050003a1b2fa775f3d988c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          afca0c7f75bee3869c4d9ad9ed402a7b

                          SHA1

                          a2ac085fbff690aa18f932c5665f66f98d23dab9

                          SHA256

                          4b6afc184d03b8345cf1e387844f64ea3ef22399baf2b66e9b18eee8194c5dac

                          SHA512

                          a05c36bc1fce11d3a2e7273d114aff782e6c79053725ea808f6d675facf7a2f7aeb5773a14dd567a245ab71a1b843bd2b60e6f031fd0d98c858ff72020d00bcd

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          738385e412e367c8baaa7dc06bcf0c5e

                          SHA1

                          a72f18b3386dc3a2974346190a7881649803474f

                          SHA256

                          1c054b8727112c19782eb785149b93e234278b73be6471f9c00d9b2a74569bd8

                          SHA512

                          73fdb4fa257701cd602e19427abd185f733b6f8c29f6d1d0ccd99800c98c8390cbbfc4da8aa5f4a1cf825994b64d84d56520f9d79bd62e72ced5631dcf8ec133

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          8365c6a046743a5235f0e4e55f314956

                          SHA1

                          9b363f3dc3731af1e1e76b4e567dfe18d93fea71

                          SHA256

                          7078128877936b74a5e953df5c4d700b15541d9aacab07832073c18ec0c95bc1

                          SHA512

                          e9621fa247245dca4c42ac0dfd605a6e13852e810c05b72386b35e0c98c8f9c960eca9310852bb07ea769bbf1a10b520102bb94b3537a5d46bdbfe05988879d1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          5cc680f022af1873951401a43b6de5d3

                          SHA1

                          1c67beeffc51982788a427e7212478421761f793

                          SHA256

                          2d6e5d8d6c984ad4e922d3e35fc9811907dfe64a0bdb146bc7b922e0f3e8e914

                          SHA512

                          47048d94cf9a04904a6b5471b9a6c9f3f176a699644389423355255f82137039bea2c132bbacb7255d7eb208621dc8f49e85703e3c01e95251c63ac30e28fde5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          118KB

                          MD5

                          5c1558497d03f1113207113a04e376ff

                          SHA1

                          a9f1ca5e8133e9b655af2bf75fb510730fdaf6ba

                          SHA256

                          a9bc4a4af15200ad9d6319bc093422a31861a400edfa249a99343a65c0d118a4

                          SHA512

                          96a7b8eba781e7fa546686e0bd78ffc37c217546320cd3066b9feb88688e69c9a9d1b1801dfa4fa5a3054ef34d15cfd5cf6f248e8e3b0bc7567cd2ba1fe18e8a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          118KB

                          MD5

                          c45c6eaf673c5f61a6bf10668e5a2127

                          SHA1

                          14d3d2b1a86c86b2f12241eda7d972dc5282be18

                          SHA256

                          b1a7a608169be070c4435e5e5b697dc888e62abcb339ff48b14a3aac36fe0026

                          SHA512

                          2ed66544bb50c2f7ef972498c2c63a77dcef7cbf96e8c77db35c47dda866d14f8c92d049dee7959f99aa6e51ca79c441052a46b0c769eb613e112fec0ad7720f

                        • C:\Users\Admin\Downloads\Oficio Judicial violación del Código penal. Articulo 287.tar.crdownload

                          Filesize

                          2.8MB

                          MD5

                          210c0806a85c113e589fc2d038bb6e88

                          SHA1

                          a0c25718875c793b57b46b66c5de54a1a2addc6d

                          SHA256

                          77b93a3f3e2d58564ecbbcf5634fba034021c142167b336b12e81f1953c1c856

                          SHA512

                          d32644291425afc90f2315f5c7cf22c1d3927d16face60a419e85a5efd941e4a5cccdd2e18f188c0d91d4c01691c4ab214bcecc3bb8843fe8f26a710fc8b90bd