Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 09:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1eJkEw0fvdzFNxDI0nRuqOzgNgcICu_zi/view?usp=sharing
Resource
win10v2004-20250129-en
General
-
Target
https://drive.google.com/file/d/1eJkEw0fvdzFNxDI0nRuqOzgNgcICu_zi/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 drive.google.com 5 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133827037760696823" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 4940 3348 chrome.exe 82 PID 3348 wrote to memory of 4940 3348 chrome.exe 82 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 5036 3348 chrome.exe 83 PID 3348 wrote to memory of 4888 3348 chrome.exe 84 PID 3348 wrote to memory of 4888 3348 chrome.exe 84 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85 PID 3348 wrote to memory of 5064 3348 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1eJkEw0fvdzFNxDI0nRuqOzgNgcICu_zi/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff84ab4cc40,0x7ff84ab4cc4c,0x7ff84ab4cc582⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1680,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2228 /prefetch:32⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3648,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4648,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4852,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5124,i,5667908557456727354,12720215509832754397,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD53aa45244d69522369ca7e5ba0de65851
SHA155e5775473372869e038e51784acd60250ab52b4
SHA256f79454757649faf4b924483d1e01f8aae7d86865cfd7d5b5348e98ed27989edd
SHA5129be721486800a4ca0c21ac1c267e579223c3dfb36f391e156e36f8c739802cca2006cb2f077bca0acf54bb4e4de13923a382ae9102be2f676349c8b7378071f9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5f56daf65f3c69c8c2e74fb8b7530194a
SHA174a1f05613487b439b15c5b5e1889d078f01161e
SHA25693f51adc3c301b43089dcdbc05d95091a597e377157ae09629bc710315cc84e3
SHA512e251aa251a9c45bbb983390bc5573d1ad0137e9084af5d2f969879ddd8e1e14a6152376561c94c01a3df06ebcac327aec666f3359d4df26deeb9e9f8ae0fbc6d
-
Filesize
1KB
MD5a00c93914f6edf830e9f8670b4f280e8
SHA14335bd25106cedbe1af0f926e7dc02c3f8338978
SHA256aa41c9fb434484245034fc93c11fb03cccf84e21300fcbcbfd5e6ead5b18a2ee
SHA5123af0c1f2dd2953918204f0b150d8c9c9136e77aa2d9b43759732eec0a28d8d0f9d6b13f13bb324dcfb96b1b15042f77867b6dc68dba874d6d7a4a3d24f8dbf87
-
Filesize
8KB
MD5e97887ae323b87d33cd07fb47ceb3a0e
SHA16486b0c82ecf2f938a1ff6736bec6c3ff37b999b
SHA256f9bb9534befc641fdcf861ca575e1715b2c8df90eaded997612b3c3731bf87c9
SHA5124ba32f7893af5f2811a4c271ce91c2ce134f132b8c1aefa1f7999c9cd1fac805bde6ada4d3b297797ace843ed927fc1e98af4ac6167f52d6a6d9560a87afadaa
-
Filesize
8KB
MD5441501e4708d7d82fd2c634df8d6882a
SHA199af1273de5817310a99a6f8929770a67db7b424
SHA2568ec4ea61f64f19b2fd53771ae39184b9eb195219202ac551d7648d29de0949ce
SHA512d8227daf36f88c31da8bdabe3710d8e70b1d01732c8b449c3825097a7f97b70388780d0379791459e3f3f3c14ae532595339cba42a10789b82251760b9356d24
-
Filesize
9KB
MD50ca6cc8372ef890a89d3257feec62973
SHA10124da7970c809f29cb29ce991ca5f80779a822c
SHA256beb2fca43b6af401ff5cca50ac7f83daea9597fce80aacf4c6115b4e1638a595
SHA5125a0a24055d74c5b8e545b2676a817cc3a6c7b3c177632eaccaa87fdd8b812db372422ba2be10aa54f363231aa5ac3ed7f229321da1d961f75499389f86e34271
-
Filesize
9KB
MD59090ba4a7d17b661722a832962dc25b0
SHA1299562da56b506ca814546a0be58c7c70d393fd8
SHA25661872ebc88a0e12676aced665b58b20e29a03e38ef4e816a49b7d7a903e1961e
SHA51266d063c9bb1ba166651839a839cbbcdf62aa807edb576b72ebc49ddbe2fc02469bc93c9a3d7536a3225bc4a1fc18833c5ab82f0a2bb01a8dc5fb7f76ba773f21
-
Filesize
122KB
MD549c7c53481330e0fb83051a2bb5847d1
SHA16c1af3aa4cbca7546ff72a790eac9b34cfb2ff8e
SHA256c10030470d0fd92c4f9b4108cdfdde6b2e40d4ce97aec7a319ce67ae553494db
SHA512c06f79af603bb6f3c2f55b3c3e6629e64f92d421826bdaaef98c740bb4e15f33ee281490b44eb740c842493795f5b90064484a00e2ba0ffa5b9c906c94da9fdf
-
Filesize
122KB
MD5a13ff6c34f802b15d856218fdff0a0b5
SHA1511b0c38cc9b64d9424d4caf3f44e0f3c5d0d0cb
SHA256bd18dce2c1c00b92262f1628b57f85e2eca6d1043876d325ca6d9d748dd7ada4
SHA51281235362af404282c519149c6f85dfc86d3d4e3abbdb002b8ccf573d85f66d56833e9db02e3dc4b70c9d3ae4b11a91b4410ac99e55f4a373de9dd216dc621ba5
-
Filesize
122KB
MD533e088a3bb2c6afffa280e01a8d0a510
SHA18e3f1e7a726f2b71536b3948d223d03ddaac27c5
SHA2564185521645b2cfe75125040d28307d89e9ad3ce2b8db280c1f065a95c27c341a
SHA51298afb23f887b4663aaaf03372fba27798f2fa1b668af5f6e770ab464285167348d455c89dc6386a24a341668918bcc81192725ca2c62aed416ecd12c555c3b77