Analysis
-
max time kernel
59s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20241007-fr -
resource tags
arch:x64arch:x86image:win11-20241007-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
27-12-2024 13:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1qhJK8cNFt0wYal9Y2JHFkbBxTTd5Bc-A
Resource
win11-20241007-fr
General
-
Target
https://drive.google.com/uc?export=download&id=1qhJK8cNFt0wYal9Y2JHFkbBxTTd5Bc-A
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 3 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133797787670787436" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\devis-no1545.html:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1408 2084 chrome.exe 77 PID 2084 wrote to memory of 1408 2084 chrome.exe 77 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 4420 2084 chrome.exe 78 PID 2084 wrote to memory of 3912 2084 chrome.exe 79 PID 2084 wrote to memory of 3912 2084 chrome.exe 79 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80 PID 2084 wrote to memory of 4372 2084 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1qhJK8cNFt0wYal9Y2JHFkbBxTTd5Bc-A1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa993ecc40,0x7ffa993ecc4c,0x7ffa993ecc582⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4420,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4056,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:82⤵
- NTFS ADS
PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4752,i,16567169973112695956,17659914575848255437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bda124d696962609046a7b268034e137
SHA17227449783ba8cecea1627b08e38c004181f79fb
SHA256bb583ead1ba62525c0510230b0cd133ece3437a5678c3e1b11b3b44643a1e555
SHA512c821f9b3d3949f58c4eadb94371d75d290e6605a78071957ee1d27bf18227f08c132d29d2ae1ed7513a3fcc9cf8941ee3c54ad2caaa5c01de99674e10f9a61c0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD54b9100731471bedfb7acf49c57c1da26
SHA1897779ab017ef56188f2f0fc81c88725a2e1501a
SHA2565a7d35ca602c0a3ac383704196e2d8564ce631f5c84606f47344eb8c9f6c2dcb
SHA51214ea14445ca7353f6a661bce25360ec8c12b257f89e7b7e0488c7f59d3295f99b5e79663f3a22dff1f5f7136ba964b12b07f4d483f6517b4a72027163b9543c3
-
Filesize
691B
MD55b2131d997725a826b171fb3984f1525
SHA1cb2216265477ea5fe0d85c7562fde1cee2caeaf2
SHA25663c99740ee766645d9f4d7ac04a5ce42e2ae3f1afeb9483bab4e4ade8f0fa603
SHA5128111060a8032e695e5092a714d90b506b4927ea94da9cef97415fadb9ff47d657062901235b45bb4bb137a30012e061ac1f41743bef514a3707fb359a8d661be
-
Filesize
9KB
MD5c2ad88541f1363f74933656194b77d86
SHA156a9ef57fa7f554b70dd36a820b14eea37f0ddcb
SHA2569d1ff840c3461862b94139a619221aedb376957d0a67d08ab6437d02b8d9fd51
SHA512a85c1db426f5f6e0866182927b312b6b5fb798dd82270e7df1477e462b5dfe925d8645803babae26afc298d51dc0a73b51f9c777ce5bdeaa696321a6692df26a
-
Filesize
9KB
MD582ae5b3aec590988ea697a3f36b06f51
SHA1c2ecfb14ca5bc8b6b43e4cf87c621b4080a9a4ca
SHA256c0e18df22563f4e0020b5ca1d00cea23a217b2833ebe64a1e0cc2815867563d2
SHA512ef19e3197260656bec5e3f7fcc468d93f9600f1f959f68a101a22d0e8e98c866e0bfcdf33a420582e061b2fb8a3088b2a9a51b983105cea91be760a44966a733
-
Filesize
9KB
MD54e267c1c478f636edace47d74c3ab7d9
SHA1e50c556c1a771e1ec1b890e2d94cb07cdd1c0ee8
SHA2564092f301ee8d654c471d96b289c2edbd6b2e9d1fc9cba144dc8e0a6aa4962ce7
SHA512a315fe34c9650e483098eebbd372a1b52f2439bd9782d88c56e40f53e50a5355107d6c5b28b1cb1a7a19f58d1273d25d65aabb285a384aba1f2ed1d361b7c545
-
Filesize
9KB
MD5aea13dee4771c02ddb0eb382f958aa4e
SHA1d2be823fc640a022309e126e90575d37a8f897e7
SHA2560c19479220596d7bbc73485aa15d54788629342b2c3f75c227b6020b08802f99
SHA512eff52b22d5fe3266055816baab347ba03555e27a752950cdf58fdab02cb531674a28b80963d766ec9b63eee26674e5627b3789aca4e0888f9d141936a1ee7eea
-
Filesize
228KB
MD5881422d8b594c8e96c169561a1f2a3a0
SHA153648227c43043f3b8755f0023e502673fba560f
SHA256a33e7b1b4a613316ac2f680400a3c34c49265c9ec54a9fd811f0ebf149fd7929
SHA512ca5604ea1aa7204d040ee4f4e74968db52d9173eb9caa42370fc5005f1338df80cc521fb543cf931a9b268d496739863e12f5770622b01b08fd8fc4683ffb0d0
-
Filesize
228KB
MD570ff5da9205692cd97bc8f634f80b3e0
SHA16d8c148146ee75357937d5e6ee0455ea23ce7ad1
SHA2569f0fa2453981e4f860642ed7d757e6e8f120d7c02e0821df9318cfc95ebbdb4c
SHA5122159532f351566b6fab369924f7bbed181271cf3e5934ac6e8cc77bce36370f084c678a858aaa6ee8f1ba31b3cdcfef03a489a7111feeaa6332f9a2e01bd8fd0
-
Filesize
3KB
MD57a7e5dcac9ffc760239a8c7195466423
SHA175eae315a77963e89292c87dbf66f1393ad82893
SHA256b234d3b120c6899864d252e840f8284fde70ee3ba98706842219ba63fd364fde
SHA512ddc55436a797509fd7d66ba5fd78cc057113978f7fdf8cdec18866eda6c1f590334cbc492121a6cf0cb37022a51979c8cd22b8ff7f163eb532f3cc897d90b9f3
-
Filesize
134B
MD5876c5c3e2aa29b0d37f2a2592bc3d4f6
SHA16c64cf741c9e021feee6c60b25eb44c43577015d
SHA256af5986277b15c5fdf28917ae8f32aab39874a0d1f35b23aebd57ad1120a41737
SHA512348f92e1ea46d9886903ee77ed7347e649db83214f99e0c9adb1f9fcff30938708a56d824a0252467c564afdc222fdd6bb8be59ae775ea424e5c31714b62ad0c