Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-11-2024 16:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1sr6IAHJffLMMTLDOaXQNudqWyC7q5MqG
Resource
win10ltsc2021-20241023-en
General
-
Target
https://drive.google.com/uc?export=download&id=1sr6IAHJffLMMTLDOaXQNudqWyC7q5MqG
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 drive.google.com 12 drive.google.com 13 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765931722791492" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 4076 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1684 2196 chrome.exe 81 PID 2196 wrote to memory of 1684 2196 chrome.exe 81 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 852 2196 chrome.exe 82 PID 2196 wrote to memory of 2632 2196 chrome.exe 83 PID 2196 wrote to memory of 2632 2196 chrome.exe 83 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 PID 2196 wrote to memory of 2484 2196 chrome.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1sr6IAHJffLMMTLDOaXQNudqWyC7q5MqG1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffba55acc40,0x7ffba55acc4c,0x7ffba55acc582⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2260 /prefetch:32⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5084,i,2543852450456457294,16622987670549433051,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1948
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3944
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap18686:174:7zEvent259521⤵
- Suspicious use of FindShellTrayWindow
PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD542367c42eace6478fbd929cd3ca081a0
SHA19cc9e28dfe6b5d04e4e6495aaea9d7508228c210
SHA256d6624aa9c33cb01e8bde290c99ce1fad63de26234af1547104d94efdf618a91a
SHA51293c7fc7ac6b3c9dbbcad4e19bccdff359332a45fec41afb759387c6fb6dc34bbcbfa91b85f9bbc98a2b25f63be35dede9fb6e8fb454d3932d1a3413484b7c181
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
520B
MD5cf18dacb13ee881bc8cb9f6d3a0b29ba
SHA18ed34bc2f5164cfe0c978e79c931f4c11c6491f8
SHA2565adbcd4a01f7f1cef3cfcd7146e0737fd741e223c307b26b6dda18bce94d8665
SHA5127efd99213e0e545062adeea8d6055bd72298d9f48d5084004f98aa47b2ba51f26bbe8006d7ac54661377afd21713b68815f267baf8050003a1b2fa775f3d988c
-
Filesize
9KB
MD5afca0c7f75bee3869c4d9ad9ed402a7b
SHA1a2ac085fbff690aa18f932c5665f66f98d23dab9
SHA2564b6afc184d03b8345cf1e387844f64ea3ef22399baf2b66e9b18eee8194c5dac
SHA512a05c36bc1fce11d3a2e7273d114aff782e6c79053725ea808f6d675facf7a2f7aeb5773a14dd567a245ab71a1b843bd2b60e6f031fd0d98c858ff72020d00bcd
-
Filesize
9KB
MD5738385e412e367c8baaa7dc06bcf0c5e
SHA1a72f18b3386dc3a2974346190a7881649803474f
SHA2561c054b8727112c19782eb785149b93e234278b73be6471f9c00d9b2a74569bd8
SHA51273fdb4fa257701cd602e19427abd185f733b6f8c29f6d1d0ccd99800c98c8390cbbfc4da8aa5f4a1cf825994b64d84d56520f9d79bd62e72ced5631dcf8ec133
-
Filesize
9KB
MD58365c6a046743a5235f0e4e55f314956
SHA19b363f3dc3731af1e1e76b4e567dfe18d93fea71
SHA2567078128877936b74a5e953df5c4d700b15541d9aacab07832073c18ec0c95bc1
SHA512e9621fa247245dca4c42ac0dfd605a6e13852e810c05b72386b35e0c98c8f9c960eca9310852bb07ea769bbf1a10b520102bb94b3537a5d46bdbfe05988879d1
-
Filesize
9KB
MD55cc680f022af1873951401a43b6de5d3
SHA11c67beeffc51982788a427e7212478421761f793
SHA2562d6e5d8d6c984ad4e922d3e35fc9811907dfe64a0bdb146bc7b922e0f3e8e914
SHA51247048d94cf9a04904a6b5471b9a6c9f3f176a699644389423355255f82137039bea2c132bbacb7255d7eb208621dc8f49e85703e3c01e95251c63ac30e28fde5
-
Filesize
118KB
MD55c1558497d03f1113207113a04e376ff
SHA1a9f1ca5e8133e9b655af2bf75fb510730fdaf6ba
SHA256a9bc4a4af15200ad9d6319bc093422a31861a400edfa249a99343a65c0d118a4
SHA51296a7b8eba781e7fa546686e0bd78ffc37c217546320cd3066b9feb88688e69c9a9d1b1801dfa4fa5a3054ef34d15cfd5cf6f248e8e3b0bc7567cd2ba1fe18e8a
-
Filesize
118KB
MD5c45c6eaf673c5f61a6bf10668e5a2127
SHA114d3d2b1a86c86b2f12241eda7d972dc5282be18
SHA256b1a7a608169be070c4435e5e5b697dc888e62abcb339ff48b14a3aac36fe0026
SHA5122ed66544bb50c2f7ef972498c2c63a77dcef7cbf96e8c77db35c47dda866d14f8c92d049dee7959f99aa6e51ca79c441052a46b0c769eb613e112fec0ad7720f
-
Filesize
2.8MB
MD5210c0806a85c113e589fc2d038bb6e88
SHA1a0c25718875c793b57b46b66c5de54a1a2addc6d
SHA25677b93a3f3e2d58564ecbbcf5634fba034021c142167b336b12e81f1953c1c856
SHA512d32644291425afc90f2315f5c7cf22c1d3927d16face60a419e85a5efd941e4a5cccdd2e18f188c0d91d4c01691c4ab214bcecc3bb8843fe8f26a710fc8b90bd