Analysis
-
max time kernel
42s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 13:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1rtuRpBuaPrcmJLmr6pgdlPgqveVbXWfh/view?usp=sharing_eip&invite=COHJiIAG&ts=6763d554&sh=5-fdYC3dkH1C87CB&ca=1
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1rtuRpBuaPrcmJLmr6pgdlPgqveVbXWfh/view?usp=sharing_eip&invite=COHJiIAG&ts=6763d554&sh=5-fdYC3dkH1C87CB&ca=1
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 8 drive.google.com 9 drive.google.com 10 drive.google.com 3 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133790892495684538" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1948 4028 chrome.exe 83 PID 4028 wrote to memory of 1948 4028 chrome.exe 83 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 116 4028 chrome.exe 84 PID 4028 wrote to memory of 232 4028 chrome.exe 85 PID 4028 wrote to memory of 232 4028 chrome.exe 85 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86 PID 4028 wrote to memory of 732 4028 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1rtuRpBuaPrcmJLmr6pgdlPgqveVbXWfh/view?usp=sharing_eip&invite=COHJiIAG&ts=6763d554&sh=5-fdYC3dkH1C87CB&ca=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec325cc40,0x7ffec325cc4c,0x7ffec325cc582⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4976,i,15713602854037494377,6836357986203643675,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e698a3af17764e07776b15b7016788bf
SHA1b86cef4d260c68c8dbc1c4292b6cd274223c3307
SHA25661c81b999ac22e92a53afda5169511166c86901c956b0ab33e76939a23e20814
SHA512965965ae8f675130e4649e45f39ae46c77135329d985bd0514a17aa70ef093e2e7fb01c79797c83c339fb1dd6e80dc194cf8af48009bc829c4243ffa55a2137d
-
Filesize
336B
MD52682af31f0bc308b95e26d60bbaf1d42
SHA1683403402999f3566584a633f054f27850e2d7c7
SHA256f2158cbf6f4c546c5431924fb954df295e41f578cae3eab3b0db3cc5fb9be099
SHA512b9b6812013a21c1fff5e9d9d9d7b6b5fde925e0632a9223bcddfb55ed75f422737bfda913766c06dbebc056159d561c10d45ead15663ef021a3628df34601daa
-
Filesize
2KB
MD581a64063556272c45b74f79cb033d960
SHA14d0f13e1a348b6824f9b19fe952800e75131e510
SHA256f352eb4a84554224b4291d8b7e6bb7aa8545e764530a7f18a306348553ba8152
SHA5129f3653bc731e7172cd0ef954eb02fa71aa663cf355377f43f6adb7e334d97dcb4aba2efb76db880c3e405b5cfe250de98d31b463060caa4b26855c61736fc600
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD51a940852bee2d2cc62974ff20be6b58f
SHA19216b3853fdde876db8dfd6b2cde4eff9fc53d63
SHA256fe40b71761f77e3c47dced7a467d675ad2474e0fb74f177541e20ad1437f8b1f
SHA51266f56a00dc3e20021c1f97a5418b09d9d8a6959693f2d833a3bedf5575798af123d893bd21fa5a3319a2a250e75c6fec974580452f7f54e7bbf0e24eda19a70a
-
Filesize
859B
MD566f275e7f791d8ffaedd5cc6d6a57725
SHA1a41263849dc4aa95cf1ee8c98b3ef0e03588b4e6
SHA256d84cb5902e7ddfa63a106cfc01a6f468d00b96b7b758aed080913a87ac10b6d3
SHA512708231b24ff48244bfdd6fb6c700419f582b57c248c659e2ca570228849b2b2c1554ef8734d3cea2fd42cf5c124cce75cf40267b8408f142ce77cc0a5c213f05
-
Filesize
859B
MD50b7f24fc2af4bbc2214c0b1b062c5ee9
SHA1de6690c1dd8aa2c3c6b639d4032b4005268299be
SHA25691c4aaf0623f945521b016770dc20bf55e3a55a587163f0f6f00e1a8a6112737
SHA51245c23c7673db10d9231e83d5c178158334f1a3100fbc911a50f9794efea08e9d8ac7fea5e9251b1474ce002670424c90ae3b27251cac12bf91f7831fe96d87a0
-
Filesize
9KB
MD511263ce203989181b4c389e267a38ede
SHA17e0fe20415c81aa9e101e5a4c27b657a46fb7d57
SHA256e7aa9764643269c611127499848a0758f0e57a5551d98cf85664a744988677f4
SHA512520e21dd487ff8b65a76501c36db9f51ac54b0d870fbe8b4d9f03a859c06bc617a2c3cea32d3124b1a2db15dfb531bbea082d1966a0f0ba837ba801081bffb7b
-
Filesize
9KB
MD551a0ba50b3f2b674c71f0532c4efe65d
SHA1bc2980c75a5aaa8d101993e16baa62c7e1288443
SHA256907586cb2a182548e22c3b757fdac0ecb72856e76c43dfa9254a8dab1fc58646
SHA512a631be7255d2e355e989b0f1bb5b1577e2616f2b55a12e69b1cb414a925b2d53e8b01acf27fb2459eee687ae52992c64944db93ef5d49c5386564a0a282a8d17
-
Filesize
9KB
MD5f9f44e5ccc1a441cd3375610a25b04c5
SHA1f6ac0cb8f18d142d5d69e58f933b32def62a2201
SHA256961df3238fa0f836fe1fe48aa632e32962b88140173c920194069c8c7e890111
SHA5121f770c0e5f2aa59b9c8d6c354af908373c2bbc413b8ac37b0d0d52afe97519a8973295da660dead50cdcd511a8ed94bd766bb4fe8249c99252ddf067b13d4f8b
-
Filesize
116KB
MD510d629240debf8a764116ff8785b6483
SHA1d5b90787ddbfe05efc969b9962f2b5a9c9be058b
SHA25621f7d0bc650abf50392d842fa81fdd6311dc51fbf8bc8a1813b348036227d718
SHA51228b19c33a57057a3dd4dd7f9684e925e7655ae90c536fd61edc82606b420a84ae57c6eb9cdcc14e1d2f8675a0aa19faa615a58e893e7003505be72fa8b7d6d63
-
Filesize
116KB
MD5c640d21ef2154f42f5f449b5e2b1c834
SHA1277f92aeaee7fd587a84b5133fc89194cd7bf307
SHA2561566f9050aab1f82398c9f070f812e29944e57deccb4927326486259d9c05267
SHA512d4dd3347f9cbe26cc8c0c3812e04e8570364f4a01c769060f6dc23addd1d5d6bc055c0aac4a3ed12f73391fd52c6492ad22db250fa35b6788cc1c8588553a6fa