Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
18-12-2024 19:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=130K3EUpsbz35XPUGEMKedION_4h77SwA
Resource
win10v2004-20241007-es
General
-
Target
https://drive.google.com/open?id=130K3EUpsbz35XPUGEMKedION_4h77SwA
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133790225472145111" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe Token: SeShutdownPrivilege 2104 chrome.exe Token: SeCreatePagefilePrivilege 2104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe 2104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2404 2104 chrome.exe 83 PID 2104 wrote to memory of 2404 2104 chrome.exe 83 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 784 2104 chrome.exe 84 PID 2104 wrote to memory of 3624 2104 chrome.exe 85 PID 2104 wrote to memory of 3624 2104 chrome.exe 85 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86 PID 2104 wrote to memory of 4536 2104 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/open?id=130K3EUpsbz35XPUGEMKedION_4h77SwA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff95c0fcc40,0x7ff95c0fcc4c,0x7ff95c0fcc582⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2060,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1844,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4600,i,11357609491516480345,13438258499523796372,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5579e1ba51aab89692307a7bea5373a29
SHA1af77d8ec3745cc6a4c6d8f4a562018977f248006
SHA25655519234b333d86ca00b39454da4e41f06488f4b875381be2f80790ef5613296
SHA5121d2be3bd49868a3314b62c53c8ab28ac20ca90295c48a21401209b6cd20c8ad29481529c257d67707d9b353022620082bc9f5f42113cede8d5cc028a35ff7a80
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
216B
MD52a3b725fda276e97486e5f0f1a1b82c2
SHA1b09b8bd10825b333410673d648aa89308d0016ec
SHA256c7ddd8028d1b69e9bcdcdfa6438d88710198e38ec5e5b69d87461f8e456bf93f
SHA512104e85c991e8fa1d3da8e61dacc2bbe99a72cc009ff940f42fe6e1902653d848cda507872a8000cacb0e38a8c31e7d66930da8ac41c5706c7b6e7a6f6f062ff3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5bd0e2fed166e5a8e9a34e38fd07e7fd4
SHA104877ffe43712a389e6e1ee8dd655cd51147b5ce
SHA2568e20bca71b03cb79c23da9c62f02fee693aafc7cf93cfcf1a8badfd8f778bb64
SHA51233b5a258a90ca01057268c80bd63feccec3e625db128972c2eba12caaf910c5acb64a0cb6d921fd3a3f824e67de3be397fb2239ef16f43c99cf3fc690963591f
-
Filesize
9KB
MD5659de50b11cab2f0b1911c71487bc86f
SHA1bbaaafa1928c27c984f9e48b3bacc887f5eba7a0
SHA25653b29c58d2306b663bddcc19138b34494b670e4a65c922e9175a9c9e67944481
SHA51268109a3a1e34fd35ccf63bc2de210adaf2d0cffa1dd2b1e8db2875acd2d2c9c38c344c079e7732f4a414dc19aa805a378b45ae08034a01ec2a2f5e90170fd989
-
Filesize
9KB
MD5b409003068cd274ce106185ebed9c209
SHA170f514c8f56aa466077ed0ed677574eb25a9a3b6
SHA2562a6d4f65072e58c04b9a929fb076aaf012034dc7a404cbb1ebe7b61bd33734c2
SHA5127250d4b4252df23e13167aa0132fb836b20591f37e48622cb292ad2c82ce1b9a4b92bef8c06dd3393e931a97b6788c8f7f588cc4f1b30b506680ef918adcb474
-
Filesize
10KB
MD58bd18ec389c89d7a5e3de8aac6fb8563
SHA1bfcf5e7930a4c17b5e587ced3d320d38c73c2e55
SHA256937ff7a590f44f0ef6edfb8bf5744db9e3e12ad6c6ba9a0fbc02a447ad2e5f93
SHA512a7ba25e706826b5444fc6d7b4cc9e0ea69eccec8e48d18aac52bfa51d17d2bb705776433b7655922ee4cfc53d5ff8d2b66a175bb7b5271661d532ebca1a97b88
-
Filesize
10KB
MD554b50e8aee96a1487aba8a2003d0032f
SHA19ea9f04f3ddfab139867458f284fb040a5655a69
SHA256afb61c081db4d64c0b561c3c9086c5f011664d783ae0d8333795db8dff935c91
SHA5122948c36ddc09f7ed0e01e861a79973589d391081946de8f7e209aae0337622e7eb67e6c68fbcb1f53d57b8354f5ff9eb860206ec65e204d4dd4025a706aff634
-
Filesize
116KB
MD535751375affa281cadebff0ae28a78b5
SHA15a204b3ec1761acd09a21098480914830dc41392
SHA25663860d870f65213b31b18148f48a4efc4ae3e2e3f6c4b2b91a17d16901c50cf1
SHA5122e742f8a6a542df64e215821b991dd3e62cbb933f9a63774566c02cd78f3908489b371c38cc784e6fdc0b82c9f3460d6ee41749f0fb74f8a1690947b95f71b4d
-
Filesize
116KB
MD534f6db4a5624b89732070753ec995595
SHA1fdc59b90299ed7ecd92b0c22f8347aee7c1cec3a
SHA2562d1d0e19ab7db74395d9e69148de1ffe268ca9c39ff6b0a3a9e742fa4f4261b3
SHA512542e8db2b0e0a1f79589311379747db0fa455dea00a6c490724b2fa8b17485d373cdbaf83228c74bf3e48b4d55450bb1edc96bd8497dd3493f7e11bf91154df7