Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 12:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1v4OOk70801WewhnaGevyVCgSSX6Du3KD/view?usp=drive_web
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1v4OOk70801WewhnaGevyVCgSSX6Du3KD/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133815921205249484" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 4396 2572 chrome.exe 83 PID 2572 wrote to memory of 4396 2572 chrome.exe 83 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 4768 2572 chrome.exe 84 PID 2572 wrote to memory of 2604 2572 chrome.exe 85 PID 2572 wrote to memory of 2604 2572 chrome.exe 85 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86 PID 2572 wrote to memory of 3036 2572 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1v4OOk70801WewhnaGevyVCgSSX6Du3KD/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9da5ccc40,0x7ff9da5ccc4c,0x7ff9da5ccc582⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2012,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4564,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,3743688250635326253,16496594818005795801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5df83702214521db3a8009a269acad94b
SHA1b70ea1e15e615ac3c08a4e682fa96d267d1bffda
SHA2565f7d2b522bd4943f0ec097b9ba6b65fe3242da83e8d948f757edcf93d55719f5
SHA512d5f5b3d8e400eb24583b6d6e26a896699c338f8e4cb8242c7ab647e333c7cf5d79e6a24c1cc2f9a04280fb81a661a08b8d5a9e8e6d37bcb45b8978508285cf01
-
Filesize
408B
MD538fec5e71569f69f06881b656138edf9
SHA13428f82deed6b42b47431600d4f23eff4c7b985d
SHA256039f5e9ae70ae4231fcdde62e8c7fca79bf038803eeb4fa8035de5c94766de8c
SHA5126c07f73c54fa1b63534bc59e52a29e7227d3c5b0b30f435dda9c0c3a446e02427f9e57e6a89e1759ee6cb1065ea1c2522b0ff5676c8aa80d8eed2d6ee59c153d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1024B
MD5f55d24ef080756e5e9fd1fa71597f290
SHA19a81b51b27ed61b57baa50595e7d43ddfba09007
SHA2561b71608e88f7f85d3ff2bae140bd9d8c3b8b95cf80e8e0ba8172a6d7c36ee807
SHA5124480380e51cbeb8c9c83a07d0e9090f28a2be42dd98a964a583afc59265918821250a6e3ed8b1a920e8bf0b5af6240860d0a93aa399fc83d72926e9692cbc764
-
Filesize
1024B
MD53aab44dcc39c8733dc2c532e7d84108e
SHA1a63723b3f6ec6854c4460fc74116b4b36e6af000
SHA2563369654eb0bc085a4b6893884d9ea71f3ec9509b5549a86de316c98234c0a1fb
SHA51262d6b6a6680c560d29b45241545040e8ee403702482a6da76393b66085af16f528fe9269fb00d849b6c50c88d9569f4685e6360623608dd6523f336f8c501b02
-
Filesize
1024B
MD52829cc8bcbe3940db984382f29b35706
SHA13b2723abd7223072a1a6dcf159107c48bf9cc11f
SHA2569eee1862783a464ee26156b382e7cb3a143f8086b557777b38b8456fd36ceea3
SHA5128f32cacf5fa8edd20b3cb7bd02276bcaeddd308e19447bcf9c6bc1789f55cecf3d9ef161582afacf92fb234947db257efd49caa4646d3a86bd1204779c469e49
-
Filesize
9KB
MD5ee5e2ac555eadc2791712572d7403093
SHA1c7d51e804e68667edf4cbc169e651ce5a99954d1
SHA2565372025abd08f16a688a87fafac830facfc7f407ca8823f0cc11026113847699
SHA5122d4c14d5e08c850a179a34e086f3a7a8a3384996479a2ad20bdb5f020fcbbffd73854e537795ba3a99497c4e8e4a3cd8ecaa113dee541ac978a3abe1316122a8
-
Filesize
9KB
MD50ef15025a7dab8608ad20e26d0efd5ae
SHA1232e4f5e5f478e7de0a5f74a5f32f5da6189ea44
SHA256a7845fa207d96214cdb1ab79c8e00fc2a7037c60107a4a5f4a613dcf9a28f47e
SHA51224e27e5e14d71bf3a65409dd7f032c6d066c1f52614bc588566910573c1bce1630939a09bff14162fe3e4d04309ebb35f48d209b9e7f5d90e9e579a5c3a13c74
-
Filesize
9KB
MD56437cf0e19e72aa9242bd4b46c3ee9d2
SHA1ec0d777c1f5901bccb2096b9f8aa254ea0bc6b6d
SHA2563ec7420d90d32f6670f634c112037c4c16bfecc38100702a120c87926375e88c
SHA512cc7f678afb68991e50f66f5518fde138df6e9963803d052b59199752ffb7a697934690508b6ba158062007a920b73e4334dccf9e8bc2f60aa784ff08c0b83812
-
Filesize
9KB
MD552d66ca18573e1002f78e14fff937d70
SHA1f3f96679713cb97218429bf7d7355ed0bf28173d
SHA256af21c4f96c983b0f60af2f9216e0cdaa3c14465b93fa6722f63ee6ab5f3b6ced
SHA512bada1a1b6c05b747993f54a80e824c6d091e565bbb436dc1d09a046267ba425a6214c6f5e684155dee6a3572e873d8ed830c5a5e3330b488bc3e96a21465e562
-
Filesize
116KB
MD58cd765af477a354260c4bd8f6daeef09
SHA17b7129664bafe2cf7b7cf7d5e9c93da07828191d
SHA2568c96e3ed30e2edb20ebaad0dca14d39bfd9f61a199240790f59d36e44fa0fd28
SHA51213203d66240552e0780e3a59200cf1ae9ba4d74d5709800043553a11be5627c8fabdc4d98100c4db661f37a357293c99bb4300e5da94a74df8c32c0bdecc57b6
-
Filesize
116KB
MD54bc6b71935891d9221f98f847215de70
SHA1dce27d24f5d2a6b7df947e2532debf0634b818f3
SHA25604052e6dc0d70f8bb95bf009d3e53c2e5c847d0acd9926e866337962bea17c80
SHA5129cf14652f11fc6a90ecf18cf8db3bfc383661a0c45915bf65a8fce3398387c77032325260acfa5e1bfc87a47dd900551ce1d54bace57cc634ef3142808e000be