Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 15:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/13j9rfWctp13ldM9lYMwq6vfS9e0IWQgv/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/13j9rfWctp13ldM9lYMwq6vfS9e0IWQgv/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 drive.google.com 9 drive.google.com 2 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816037157807635" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe Token: SeShutdownPrivilege 4336 chrome.exe Token: SeCreatePagefilePrivilege 4336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe 4336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2872 4336 chrome.exe 83 PID 4336 wrote to memory of 2872 4336 chrome.exe 83 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 2852 4336 chrome.exe 84 PID 4336 wrote to memory of 1856 4336 chrome.exe 85 PID 4336 wrote to memory of 1856 4336 chrome.exe 85 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86 PID 4336 wrote to memory of 3124 4336 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/13j9rfWctp13ldM9lYMwq6vfS9e0IWQgv/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe76eecc40,0x7ffe76eecc4c,0x7ffe76eecc582⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4732,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5100,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4528,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5128,i,16183492039192627120,9960150196582591219,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5506f3ad70329d941e93fa3490b53761f
SHA11fc29acb291c33bbbcc8e7bc937aff1ab850fa44
SHA256fef0edd2a6956b1dff4bc3606b3744e8386fb57cab279227637816e36d7eca18
SHA51227d118ce3cb7380ffd38b6f03d64396bb97f0c21e46e6f49bf422d2e62b17a4a976a5fd460af6409acc6db5509eec31f822ff23ea85733adabea476a119663c9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5d642547ec353cbc5659b6514490a8852
SHA1a0097231a588449297c822bd85e3465eefeffa4b
SHA25666da1aaea86c0c82cc71a7f930d412c671d25af5e88c0c0014e3fb62ee9f824f
SHA512f90a1086f8a94004c225dbc5250a5cb8949da7a0bc66edffb377feb2488f0165375520b41b08f6496535318618cf7e1777d663734018cc4cf6de0076427681f6
-
Filesize
1KB
MD553951ecd9fe92fce13df055cd1bb560d
SHA1863d83500edfc7b1e2cb91e7531afb7b8fd3959b
SHA256341d93c46f7fcb3af3ff8d74e7b8f9b0187689cf9547ca906cdda9fca4df8bdf
SHA512ea4554ab2f26bddee6bc91b79d3bcbb79f953b993c0724d322ef68ffb1a94499c2a17315852966de39423950415d2fa7fc6a994a52c1d5d5328a6f5581f4f34b
-
Filesize
9KB
MD574886fedc5265b6eb35a2878a2b7a7c2
SHA17b1cf1381cdd1e6427d7d3ff41a53710a0d4f8d9
SHA256b4976c2d19e95f581c44f01ee716406d979d95d1790b3b169331772778999614
SHA512132258018d250fe8d6346d1997a553fc24cdb5bea99586fe5916c1fc479c16e50ee3eff841bc310af60ed0d36a03a50505257423c1a950ce5e15a9ba1b096fc7
-
Filesize
9KB
MD5a99f0781e4bb5bb3f4e1f9091c68abb7
SHA1def3dec24decb53350429d7af1b9a673b1b42f6a
SHA2563916a53f01d61629e3df25e1524f430a2f05be3d256b0060965bc149b521eb9f
SHA512d300bcf7b617446e0179775cbef36fd96148ed9d204253242a0f8c7d13bf5220db46554fef501b5a959ce6c37b7fb2f408be04facfc10f819ccf1151d7cf242f
-
Filesize
10KB
MD502a1d8b0104bf539788dddca24569513
SHA1bed8489cc15167d6d02b93d7e259a8dc6056d14e
SHA256946601564f0a28edaba5261eb33a14c7f8bfb8a1ae57a78440a0205bc0e67ca0
SHA512ac65648fb1b3f9afebd80b70fda3d108fb77692867c581e37dc28257f1b3fb5f01f4438b25c0ff9662818733ae3ac9ec312717e8c7cfb8c9e02b5e90cc2f4df9
-
Filesize
116KB
MD566d168c7ba28656a3663d2402a8ca31c
SHA13a197c10a95042bdf57ba772913ece409153d401
SHA2562591ef61186ad4aeebcbd55750c558c8d3f390c3f1364ba68d9fcda79e1d863c
SHA512d9ef58dfbc79cb60f7152c44a79dd502ce256facd9e08bfde5ff1d4705c2da84f2a2ead689e14f6f13e6b3d52d6ba09bf6ca089247b5df7ab79dfc6bf2601e1b
-
Filesize
116KB
MD52800c8429011d632845fec706a127913
SHA184378628aafe10f793097b27b08fa46fe39b5f5c
SHA256b3967ba3f0dc56effbf39f4385add7bb699703f24e020b3ccfd551f77d6916b2
SHA512b048a1065800c3136c4b573e61a14f7006b416d443fb6af2c3d1e59d8d057e103bdb3f0e994e7ca3021e1c289f03bb406323be910190a8e972740dc471c0d4fd
-
Filesize
116KB
MD595ed8e73f32d91ca9f01364f30e87bdd
SHA13dd1d7162091e11b7d5d9284d5c5552d3eabce39
SHA256388c4c00957a5d2c6e10108b6946f8b9df52a674d2ec4965b53c3bb4a71c9fb0
SHA512d1eac6a474b9a8bf22228339e68040dbfff2db2636cdc7399b55340d0085b56bab643a4a1288e17f1be307affc30140898bb3840ab20d9546d9d4d1cfb081d61