Analysis
-
max time kernel
45s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 03:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1O11I1Xb412WUXDfYCh2eiETIigN0Q8H0
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1O11I1Xb412WUXDfYCh2eiETIigN0Q8H0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133806930722076247" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeRestorePrivilege 3128 7zG.exe Token: 35 3128 7zG.exe Token: SeSecurityPrivilege 3128 7zG.exe Token: SeSecurityPrivilege 3128 7zG.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3128 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4732 3104 chrome.exe 83 PID 3104 wrote to memory of 4732 3104 chrome.exe 83 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 3340 3104 chrome.exe 84 PID 3104 wrote to memory of 1352 3104 chrome.exe 85 PID 3104 wrote to memory of 1352 3104 chrome.exe 85 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86 PID 3104 wrote to memory of 5024 3104 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1O11I1Xb412WUXDfYCh2eiETIigN0Q8H01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb50ccc40,0x7fffb50ccc4c,0x7fffb50ccc582⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1768,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:32⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4892,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3184,i,8596211600262055381,7629292224920998746,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1952
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2304
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap6223:130:7zEvent128231⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD548cb8702a5baab4618339e9aed9b53fb
SHA1c19774c45eb8846b770cea01c143a77b4504b067
SHA256fc614d9191ea3954ab70bde5d05ddeca26771701ef5471c76b276d2128c96afd
SHA512d41151005cb32b735bbc6179fd6c489e963b5725d476ccd52f32b5bfebdd50df52d570960f4305a4cc4e8341edcaa308fd9b147318aff918f7d890bfa4c3cc92
-
Filesize
1KB
MD530919a117ab9b95a104ead1d7bdafe56
SHA1af6df28403e850278e4852f47f75d2b8f2ed8bb7
SHA256f6c24354b5edc03ec310779407a793a7c66d8d0a9ae1bb1324821d6de03c517a
SHA512fef4617136c45e17a8ea39ea30df80bc2b84c37500d718333d4237b612c47f666c70b8d660875f6b4b9bfbb115635c4c3af21b07e8e388d2bfc1b436f050c073
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5b4d6c01b026628acf7a9229b81e88f83
SHA17855754dc39e48aec7157644afcd478f49655097
SHA256abd33d058ed89149f85637964e4219c6a2a34132ff96fc8eb67c32e0435481e4
SHA5123a1476996174dddfcbd89042bd9401a4c9853cdf528c80eccf5740865671ac7825c9c6794bff05a18b124a1cd84a901d35b73b4ac983d951c70ed71d4a0aadad
-
Filesize
1KB
MD5f442dc8f7103fea102563c62b16cff3d
SHA135cc17648d8240edd91f742f4b0af1f3fbb2b5ef
SHA2568adca826930395a45547774bf83321d0f9a8624eb70b8978f4f1e18c8fc52a22
SHA512cf45f0d122d0074c03c0efddc41ed3ba18e8c79f38e9353e5228bedceec1a35b9500cd5b9d12c4813697f6efa1ae954215fc42721732e7eb23fa7e6913debe66
-
Filesize
9KB
MD522dd6b2819363a8f139aaab5ee880267
SHA1e865a4e69076ec9a7d66745b601c4086234a0aa8
SHA25659fa4ef105a3114dd2b30570febd1c4a2ccb1c08df97ecefd032d45ff10b5a07
SHA512725bbf9bbd21224c70ff2c5358c146fdad9cebb60aba3fbdb3b3ad5c1fe69767bd2f5de81b199f497b917bbac7d5c90f6b946d5dd33c73dc4ccbe76843fe3a3a
-
Filesize
9KB
MD51da4110cd4f0e8197d300a442471590b
SHA19ea22ce75cd31bb37636a959b7f58cb87afb7104
SHA2567671a8bb33ce0ab4076902ab5fa1685322778335c4e769520390a5ceccc97dae
SHA512e40faa62d43e697c3288c21285cbfa1d8fe7f6c9328916f91269074d77f530106d22febd4798717ba070581fb2ead8f61a4a72a530aea564b579652825ce7a48
-
Filesize
10KB
MD57d8344e8a84c602d676ecaaaab974162
SHA1791c366dbd84d474c40838c99fa13c3ae778c478
SHA256adf179e75c2640f62171ac80e2b1df25323e52a837747806a025379600bd509a
SHA5123fa3c3c44fdff0bd624c0cabfddfad8adab2fe26f12b708c20e6a265b7cdc0e85cad5b932dbbff075a0a7af4286e9c3801bad4740956948b9bcc3f7604ba6069
-
Filesize
116KB
MD54b74598eef37e1e89de7140744e39a22
SHA1f8396ddbd8801842d2e4709612a2d2ecdddf2965
SHA256cc52a357fcefc613e27868318b384731f33aa173544388d30e65ea838aa494d9
SHA512e969286c15e236d129afd542c57061b2964830c84f21d23c23748fa16b9cad955925e6a6378e5604889b03161f5b50aeafb9086220254841981ecbaeeae4c567
-
Filesize
116KB
MD5228a71d7b4819c416da9371c41f2ee70
SHA169dd7941d5d4b310eb7185bc6d1a6d25b8c22073
SHA256235636f4b43ca8fd5519206eea68cea68616bad00c89ac00f4ed6191c67eb653
SHA512e7413c42285e8f975a91245c4c33d32089d989d9b5f71599057c575caa2a6920c24da9123a6be7a13fee0417cc03453d58f60137b438eef084f40be2e39fb34e
-
Filesize
4.8MB
MD5ca5117c71bd72cf03b29dd0d3942d6b8
SHA13d6092afc2c7b75a7c50e38e2bcc9b2ac239bef4
SHA256d79b1487b24f942111aeba6482825bc41071a169db1bbf0dee7b4182d263ca8e
SHA51256e68f38f7620705e5230812538b1571a540b2e2f12a221e482e782cc640902ed404f825d1d9ec85a96a26f7b9956bb3f6a5762f3f294d2388611c2d79bfdabb