Analysis
-
max time kernel
50s -
max time network
51s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-11-2024 19:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1510Vzc6cB_tcPZL8ECQVcoSo8xWBDFL-/view
Resource
win10ltsc2021-20241023-en
General
-
Target
https://drive.google.com/file/d/1510Vzc6cB_tcPZL8ECQVcoSo8xWBDFL-/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 6 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133769490508341398" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeRestorePrivilege 1916 7zG.exe Token: 35 1916 7zG.exe Token: SeSecurityPrivilege 1916 7zG.exe Token: SeSecurityPrivilege 1916 7zG.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 1916 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4108 4744 chrome.exe 82 PID 4744 wrote to memory of 4108 4744 chrome.exe 82 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4936 4744 chrome.exe 83 PID 4744 wrote to memory of 4608 4744 chrome.exe 84 PID 4744 wrote to memory of 4608 4744 chrome.exe 84 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 PID 4744 wrote to memory of 236 4744 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1510Vzc6cB_tcPZL8ECQVcoSo8xWBDFL-/view1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb120bcc40,0x7ffb120bcc4c,0x7ffb120bcc582⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5124,i,17823241185434939129,16559398873700822047,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3368
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4592
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Osamason - Congrats\" -spe -an -ai#7zMap14143:100:7zEvent171271⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b2759eec9d042226bb0c74d7b8a8a067
SHA133bf62390d2f868396839c77946dd36d97459806
SHA2565695105f5536e77e6cc774f3d516c0970126b0ef3b1f832bc44680011c950b5a
SHA51232485aea0f2b7a753f2c824aba4ee3fbc1bc55652c77745d080ee7bd3ffac1b9f98f4257f6c6ae9f81f29062bcb10c11c198ce9b1a0e06b64a469f37a6dceb57
-
Filesize
408B
MD5af7492a89f1af94ad0a40089fbbc114b
SHA1b7378abdc36b52d04bd64bad231fdb54cb91af29
SHA256be4943271294281c6e8eebea0f55d492964d7660c25bb8a8ad108df0c5d67abc
SHA512a8fb66e801b1070c5d994630502c5b8a668aea7839c373a044954d0c37caf3bf82671cb3a38bdd6f0c5d456278a008b8af61b342396c05e8482e7ac58f6e5a0e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD579eccb03fb00ecfdce35a2b396d2ac86
SHA19b1d30ca92e2ff67f43efd1d33b3294a1ea0a9ea
SHA256a6980fd36be536742bd8427fde7e8453348aa0f0834b922385ef6425de98affa
SHA5121d68a1f6168b096456d7712692e475b15171ce83f60057979ae32d7075274238faf27066d4dc653dc0422638c2ef83038cb9d803e4dfed678cb0962c1655e636
-
Filesize
9KB
MD59cfea216e2df615b02f64f5f5c40861a
SHA1c9021e1aa0cd634f3f4fe23ce76f2db817a3bfac
SHA256237076532ea371a5f228b728b80e9f1c22ed7342d00bf28d5b2da5e4388eb326
SHA5129158625d11101f19eb8468a176f184e7202092a2c584bea0b80841c79d8d2d78c82a16468c8105d70bbffd53857983d402a558b9218a0cc26f8a893d566b7791
-
Filesize
9KB
MD5c35f0a613f7e389ea24d7746b2ff2e80
SHA190b765b92ff459af9eaaab0301542ac836f3f0da
SHA256cd948fdbeebe05562420bee6b2424e5adc0101eb04a32c4f4d93b68f8318d727
SHA512740e5617d091cff25e033abc0c48b6fb79680ceeac7bc58c59e4e32d25e413864084a3d374c47a02f75af101bacd95b8259f37d7257365c46b3a987515f828fe
-
Filesize
9KB
MD53194b6f4e9fd0d0f17e9c5b5b201fa09
SHA19377c6a6422b9cafa8999db72be912d024283a31
SHA2569a62de1e4f5a75a369f51403ec69ad6cdce969a39d3fe191f8c2080132b123b3
SHA5125ed2126932a5c6c52839b0522f17d9088172d9782db591f215b1d4046dd400a872bb8ed052ade728369fdf999708efc0cc3afd4e115165ce6a04ba4d565ab9dc
-
Filesize
118KB
MD538a6c02860086a9c725113b0700d017c
SHA1d600bd1521dab08b2443d3bac9199a0573244bde
SHA2569113d55a116aa87ec290a83b8d21de3674ff73455820092d84d0e7deac571d03
SHA5128ce07fb3ef01d2a70973767bf1f0e990ee111b0035393f37eda635cdabccc1fb36da82b3842b7e05ea214f8c358f9459a4cc641aba4cb55e541de62ead5e5ef4
-
Filesize
118KB
MD556ffe53d1b6d82551a14f61e15ce23e3
SHA12a1850db467e1e4603f3ce21c56f3a6fec563af4
SHA2562310556a0ecd3dc147dd31aebc6e01626c983cc64e55b8914f1381ebda1c2cfb
SHA512c3142f8635f2b7047b8e5d6bd700cc1aab66ce54840cd4288aab28211013e4d1629318f4742f6213bd55566050ecc5811ffae05cf80153d6fee387db411a1926
-
Filesize
2.3MB
MD575c687394b79197430c3978d8a7c5824
SHA115aa3b9fcdc336f2946d6b4771c93e8c7d61ac82
SHA256245a8e9086b1cad0ff945de0ac1ae4615d9739f7a9ed1ae250020c95c3150fe0
SHA512da1e8fe709884321e3ca495d0e8a54852def6c9a48aa603d5050745b59eba45bd640a57b6b70e6e5bfd6428ca7d0546619ba66b6d22ffe8f357f979343682a8c