Analysis
-
max time kernel
43s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 21:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Op8y0NJs-3CrU7ZFQKw1D8wxng1RCjeu/view?usp=sharing_eil&ts=674e1316&sh=0j8AOnFTJt0KqxNy&ca=1
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1Op8y0NJs-3CrU7ZFQKw1D8wxng1RCjeu/view?usp=sharing_eil&ts=674e1316&sh=0j8AOnFTJt0KqxNy&ca=1
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133821423302379582" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2408 2600 chrome.exe 85 PID 2600 wrote to memory of 2408 2600 chrome.exe 85 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 1720 2600 chrome.exe 86 PID 2600 wrote to memory of 2196 2600 chrome.exe 87 PID 2600 wrote to memory of 2196 2600 chrome.exe 87 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88 PID 2600 wrote to memory of 4288 2600 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1Op8y0NJs-3CrU7ZFQKw1D8wxng1RCjeu/view?usp=sharing_eil&ts=674e1316&sh=0j8AOnFTJt0KqxNy&ca=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7ffcc5c5cc40,0x7ffcc5c5cc4c,0x7ffcc5c5cc582⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,16646404277959327151,15419676882071267294,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5238f22cd3301ea4de9866a2e25b55ca9
SHA14e3ebf17122803eb6ca324155f6fd09f97a74a90
SHA2564e27a88011cef08ad7fecd28d21eb59e86638a75fc14f263995ec8f546c0b7ee
SHA512c116881a316122e13ddd38d8237deb935aa35a794bb736e352e75018913eef4b8a6213fefab66d4ce5edb31d9e4e61a3aad1132544148c534e6cd59bcd7f1c0e
-
Filesize
360B
MD5144aa06b3231ae952648de30e0087e9c
SHA15c6bb282a425d23b01a31b7e49e1f4f7be7e6a66
SHA256ecd3d97acd68e66bc4ad240e8817b78396b8827dcb6fab63f5bdc41320ea32ab
SHA5127583a429d4f8e62624e94d3552df4e45f0318fdfbe57f99ae341d8959af20a6ac73a296f3450162a8fd5864e5d3157e1f92fb91c5723aba63ab1749c8c44f073
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5186c3fffeb9353cbc60e48426a6a1fe4
SHA150060104057f8b5466e8a7c78b34a02df145753b
SHA25632312af206635ef577cd28669fd41d75b9ae32a27601633bd2ec9ef648e6f4ca
SHA5120f85ec16ac3559e7c8ee057906527e2858f8409ce2f79d439a146c27361ef73ef73cac8c942ebcd1a453cafabbe9309e348d6b9b56d4f7fae3789cd7c8dabfaf
-
Filesize
9KB
MD54921075fadb7acaacc60cf95722cb700
SHA1a9e4d9195113ea6a94dc596bf0350a42f691ae60
SHA2564929b607e80935690c4e5d6b6b9903374835f715b6d1226b2b24cca440854325
SHA512b221db9c979a00294ad4eaadd4ecbd303f09cf05487f23dcc296f868ae7075a590f7b025b1b7c7ea81c7315439e4b96b6bf1fd5c52d13e03f12baf8f8af4066f
-
Filesize
9KB
MD59ff11135024205a506ab11ccc702cbb8
SHA1707c7bfaf0da5a328f6173fcdb2ddd6446372618
SHA25619850c73cbf54a2454b0eb5165e0a6ee580317eef6d2800a15f4f1d76f1b2029
SHA512ff08db5498357943ab9149b726dda293e616bf9fc9e613737665d247fdf6d789f3f24b72616238a5098a28d80922f9a904b97edabe8e8da896912177e70406cb
-
Filesize
116KB
MD548f1e142fce780b94e81a3ee90b4508d
SHA104b3098ce990757e5b4642c1c1f311cf23505bc7
SHA256db4689d3360d1598e63ad79aa0d3ac6bc622f0483540969c26bff7272b5eaf05
SHA5129a2f5a5b2d9de4e54b5a668bf5c0d0e5494513b180d9e924a4b103ba058e09a78b5df7e3008f2cb6ac2e5b0b08cfccfc3af0fbed7ea0662736c2f9a6b58077f3
-
Filesize
116KB
MD5cbe89c3e251e6e06b4b447cc5a4d3906
SHA174d2641626c53a886e0199138e378e023cd7634e
SHA256fb86acb6c197c54b2c4b213012f494952279fe9e6f0bde2a7d54a6842300cc64
SHA512b5acd1305b868671e415342aa7c18a8867d45ac17858077fdd32b33c6ffa2b083ae7b685ebcbad52f141916eb5b6248ca804cb1343d16a10e33d8ef66dba1ba5