Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 12:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1YPJ4-umZRDCCPM55BEVJfBjVoAONv0gg?usp=sharing_eil&ts=679750e3
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1YPJ4-umZRDCCPM55BEVJfBjVoAONv0gg?usp=sharing_eil&ts=679750e3
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133824554681395321" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-493223053-2004649691-1575712786-1000\{5340CD8C-257B-4741-890E-850E8261DA21} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 116 2588 chrome.exe 83 PID 2588 wrote to memory of 116 2588 chrome.exe 83 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 3664 2588 chrome.exe 84 PID 2588 wrote to memory of 4764 2588 chrome.exe 85 PID 2588 wrote to memory of 4764 2588 chrome.exe 85 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86 PID 2588 wrote to memory of 2580 2588 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1YPJ4-umZRDCCPM55BEVJfBjVoAONv0gg?usp=sharing_eil&ts=679750e31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdd3a0cc40,0x7ffdd3a0cc4c,0x7ffdd3a0cc582⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4704,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4712,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Modifies registry class
PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5036,i,12778477244661524071,1255490057835032245,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5dea23d577e4a82485d4a5bebb09c85d7
SHA177ced1e27a702b4a2f98ade4f4d1026ba4fc9640
SHA256529475c64d5a2ec5f55bdc61c9c4156bf6c4da9fe9d3d48d9a7c96efa5e54ff6
SHA5123cd46002073f972e87c81a28f340fe3ac1e7b880412ecc134bfe4c990bd15127bdd68c474f655d2ef730598840c45985c890e6a9ba41cbe4fdfc9ea7fd5ddd51
-
Filesize
384B
MD57ec055b1fc3e0bcea77be34bb369d736
SHA1a902c7d901649b33085d615e3548b4c3dbbd81af
SHA25675a82b7388d593bea5bfa707d6432145cb8b2db86defc307834d333373ad66b4
SHA5124b26c920869ad4827a542ace4c0eeb941d0a6c50dc530114326f74cf46c3d577cdfb9295646a687d3ee764562edf23fff88d51dcf0d2512c77ffa846fa228282
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\32d8f638-ded3-4eba-9148-5c6135d27670.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5f9f6047e114f3f51b5c04c7775684ead
SHA17214e26031a16ba0da694d33b63266aaa43c6720
SHA25686eb09c4d502a24da366938f6d78d756d30233a7f597f525a726c0fabd687b9b
SHA51224e982dafed1d495818067f67991c6bd020163492c439b35a960101ce8fcd5e010aa789e064c88c1da326c7abde2571ec42382aca86b73e2da0593b05baf6750
-
Filesize
9KB
MD5caa793247646bf7fee341514457d1fb5
SHA1b71aecf5c632e8fdf5eea732485f1b12cfa4c09a
SHA256ce280cccee4a74d74d7ebcd5b55d29b5428678a24e95b41554220607422139fb
SHA5122557e78a8bb8123792f2b7b5a57870bb4f1e03009266ae06b49dee4d3073b0737dcb03f84afbd3d01559d7ffe69a25f194c0b9f5fc33b9da63558465c0d6b3a8
-
Filesize
9KB
MD562f879ed26d71114939689bd3530cfec
SHA122e97a9f1fa0f5b6ae9c36c2c2832616e3188874
SHA25649ef51fa12ac6037f13ee1155e3804504bb3178ef6ebc47910f387fed7e05e70
SHA512a97971ce76a0e9497baa1edc2a58eafe96f774356d05fe6f72e56cdea185312b04c9e89eb806660a151f60f5a836890704201690f120a9d75586eb73ac11c531
-
Filesize
116KB
MD5f94c5d8e79f9a88296aaac90fd8aba1f
SHA1085d122914e472b553b9b0d74d9fa7b1eddb5ef1
SHA256b9f7fbf8057df3890a9d5b2f68cd7e77ec76c092fde6215cb94cd681e20de931
SHA5127fe3b3574c6b9ba5900aaedb747fe9c13d80d7292d3337fd58450d74ec3f1de36cc5687441b3a0f0bcade1ba27645c85758124623c8e9f682f885681ebe7f4ad