Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
17-01-2025 21:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=194mpkm9i_uvMtlTj7WtjPeYRfTtEGbTb
Resource
win10v2004-20241007-es
General
-
Target
https://drive.google.com/uc?export=download&id=194mpkm9i_uvMtlTj7WtjPeYRfTtEGbTb
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 drive.google.com 7 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816235746569717" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 chrome.exe 1776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1776 chrome.exe 1776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe Token: SeShutdownPrivilege 1776 chrome.exe Token: SeCreatePagefilePrivilege 1776 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe 1776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4000 1776 chrome.exe 83 PID 1776 wrote to memory of 4000 1776 chrome.exe 83 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 3148 1776 chrome.exe 84 PID 1776 wrote to memory of 1416 1776 chrome.exe 85 PID 1776 wrote to memory of 1416 1776 chrome.exe 85 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86 PID 1776 wrote to memory of 3016 1776 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=194mpkm9i_uvMtlTj7WtjPeYRfTtEGbTb1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf90bcc40,0x7ffbf90bcc4c,0x7ffbf90bcc582⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2492 /prefetch:32⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2152,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,10261622713784576427,1179008254265011218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a50ec6312058632fe1da3d50757ad3f7
SHA1cb8660ee8eaa002775fffa14f3314e24ed98273c
SHA25644e7a1530dd7437b69f5b66e92e6c005d156b8d27057285eb6bcfde245107ccc
SHA5124076b8753173c4f27d6cee6ff6481408b5ff32fa519652106e4afe1b6ed6bc9deddca27c4d38a23ee011080e0fc6eba203f70b0eb52d76bbd5af990cf98c9237
-
Filesize
1KB
MD58731d84f71765a431c171cf9de2b065f
SHA18cf89a8edc9ec1efa5ee3c6d2de2da4807b7966b
SHA256e538218646b7ab6ba4eee6141438f253c784b5347ff8f66e56cde02d34d22cd7
SHA512eb83a20fc24a99e7100dff0083d0baf7d97d7fa86db651608581b20902fec59239323d813b98a49f03ffa8ebf4efbf815191d575b16a70f4558f055acab065ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5893334fbbccbe9c530e8c8036f1818f8
SHA1985b06aef3ffa9b3db27c19dc94b237d2f40afac
SHA25636ab3ad1bd679f55a3a5918c1d320b47c979cbd2d656b7259a639eb310c7f41a
SHA5129bd202b4c8d226669c4edc0735d34a6930bb0d2df7727a8f87755dca3429133eb9bd762048921763b6640e32d94f5be88126343e8fea03d75289005015da35e2
-
Filesize
9KB
MD54f20a36a61976689b6c6f22b5646489a
SHA13a7551b12fb69fa49fbbfb61d27b9a2adb50c7b0
SHA256c1da42287f729daa31ec6df005b8916bf693bd14dcfbe8deb79a0e5efee31b1d
SHA51227f07fe414bc5bf5d8c0077b6fb853e6fbe327ce2d19efffd86494e519de98b399159fc0da4a63d76a09dcf478bfb1e75e2be85673e4f482a4d4199bc9f16c40
-
Filesize
9KB
MD5a243b74161d57ab04f82818c996c6b8a
SHA1fd8c5ab77102e5df5f3d385af86899ddbd0cd3f4
SHA256c23137fc6f01e0f99fd600858302ebbc5e5bf3daa7df3979b0339a3c9529ec91
SHA51287666e8b2b81e40141b943e5582439b9e021ae331ad61a837908dc36845c073ee14b2a5224bdf17cb9d25b2f72a8a406a601d787f3dab9ca0f5054d152b6812c
-
Filesize
9KB
MD55b55c66a7124f480f668d8a912a97608
SHA13f586c6f4d16309e5060c303f705e53fa899c0c4
SHA2560de9cdc8c5fb3d818d4e6ad73449ccfe59207d767fc375edb48eea74ff52d340
SHA51238af76d1f78d7737447e9b3c4350062d8e40c283e337761fa8bce82e98b7da19db01576ba0bb5b62e0c8b23791d6fe97eded26922fd2c7ef3f34497963845d7d
-
Filesize
9KB
MD5efe46dd6f898a8e952ada819c2a69615
SHA15976f5088511bbc5b7292bc833ddb7d57b14b53c
SHA2567c6be7c76fa70ec9b2f5d2953141d6a770e5eab0c8eff4b124e0d4d948e87705
SHA512ddbd190c9d4fefb5af4eb6b7a5d4e85b1ca1e49162754e0327bd00d504fb73ea2d1debd2fc8bd35584bbff23495f6e214b829d54559a687513916acb938ef5da
-
Filesize
9KB
MD57a315896dafc2a5bc3909934f11f29be
SHA1b9b54ca73c34fdcd22ee22932b046aafe130bb5a
SHA25664f868be4aaf48ad6968da25065a1f175495aa8c1c4f1df2ffe852070351066e
SHA5125a8e6893ef303b00e822af309f787bfb0ba9228c2d4cd32a7108394682aed11379b6c577088ab02562bdb192e7c96d4e18811b307e9d78c629acf13f9026c217
-
Filesize
9KB
MD5816d7f16018db6975612b46eccc6ca83
SHA1dd6f770cbd581aab2a3fbc267f3cdb0ff24e1d11
SHA25646cd3655fb37b85fa529d25e1976e8d780c553932ca6502cc86b5c638f283b7a
SHA51234d0832ca83442b6075b76bbfc5c0b23ad2965249029f2ee5dcf58d02e0ad1fad156cad0f0ad67826ee44cc516c5ac80a8c76eac1e738887de014d63252f002e
-
Filesize
116KB
MD5f5ebb8cf3b27e92210f7921391111b13
SHA18d3e81b24829d3da2117a51e09e540445aa229ec
SHA256b463f6a83e58a48fa5d7cbc331bb09b9175a78ddff8644f241b779270e7f5f8b
SHA51254d6d60ddfe5e7010c55b347c6f6cb2926bd0d9626eff0ea6f9c7eff15e5d895432859f3bef5d17802e41b8e5871ab1f0a203da33c3a3309f004a4f91e5d96f0
-
Filesize
116KB
MD5ed3d98776ca2a36a641c076a47ba5659
SHA13b334543a39d8c5072d1bf57dfc0dfc9547d85bc
SHA2568c105a7227649286ccf7c098608a237c82198af843d00dbc9bed4147ce91dbcc
SHA512754549364e421c1fe7cedb3423d5a0588e6d6e46fd71b2084683fad9cfc8998d0e0e448e5c4fccf1f4ac496e1efe9c3074f8e4cfb6c9e0fce0483d391b0bc7a7
-
C:\Users\Admin\Downloads\Documento de Allanamiento Nº0077877878 Palacio de Justicia de la Nación.url
Filesize227B
MD52da3607fb268402ad7cb1d6ebb18e69a
SHA1b5177d95726bf413d38b841b94d8a75854a4766c
SHA2563294cf000fc4cbf7bb24b7953646913721c4918205023a7432ffbaa7423cdde1
SHA5122a1d835559abbb3da24d99e7ba02206ff5fee2161b0fa383bfdd22a143de36a7a8f586b4a4b8495c9ae09e8662575d67cc5504705de862746f123484e2145647