Analysis
-
max time kernel
600s -
max time network
518s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 00:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1_xNbce_n5TRxItgQo3XgAqsi1vfh5R0l/view?usp=sharing
Resource
win10v2004-20250129-en
General
-
Target
https://drive.google.com/file/d/1_xNbce_n5TRxItgQo3XgAqsi1vfh5R0l/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3560 1600 chrome.exe 84 PID 1600 wrote to memory of 3560 1600 chrome.exe 84 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 3472 1600 chrome.exe 86 PID 1600 wrote to memory of 2804 1600 chrome.exe 87 PID 1600 wrote to memory of 2804 1600 chrome.exe 87 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88 PID 1600 wrote to memory of 3504 1600 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1_xNbce_n5TRxItgQo3XgAqsi1vfh5R0l/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffbb44ecc40,0x7ffbb44ecc4c,0x7ffbb44ecc582⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1504,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4316,i,2206867953561599795,6090825305520297955,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD58215040697e125527cd5b26545611e81
SHA16f2a85c584f4eb3c12572b44b05e616cb85f2568
SHA25687c669dccffdbd99cb401af17b5e922e198ba4c9ceb40b62f22fe10669902e52
SHA5123437e4bf77522f6a7cdd7120b0a7037cc7edfe0079a778c0983615f98e00a090dd54daa7e330cb2e6c63b835c26da56fcf6d991285f74400319f1a5aeb42f3d6
-
Filesize
408B
MD594b3a2706d8e3953e58c6ea671e3c39c
SHA1aa3e16379f5981806fdef2bebc4946199cfe97a9
SHA2567797d15515685e60a4aba93f7a3def55fcfe246d954bbf4fd2d72755e43fb8e3
SHA512316ac1af015814397fc9711e5d8532bc4755e1a15cab45aa1c40b5cbd79f06bc46c9b5aa55d4c36415cecd275ef018484bfb295a348d0ffc080d48a2f5c9a8d4
-
Filesize
4KB
MD59126556963123728e44dd8ed7527a2e7
SHA1d2179d6bb297d8ecfa1ef51abf46f192200e3b46
SHA2568c94af302e4bae09026360db0daf1fa4cec3fb138af3398d7fbd8b8abde99697
SHA5126de9779260caf9f08efee8bf0a2fe49b2cec08ddd0879b8ee7d7cc7e2092f60b77bef633c64e075b4404426b43da8049083e3cb32f88222bed3c640c3fa9540c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5f31d0fba826ec28f4570283e7d25126d
SHA1979ad31a9322d4c8b603eab733b815679e7992d7
SHA256d083af8b1545b277e8b5ec430bacefa3447d519837c74ca3cff2e4bbebe946e2
SHA5125854382f8b3016c6794978a056874e28ddc4c0600b909f3066064efb0ac9a3b57ea3307a57942ad48b821687301e566c071022c00e8078e4c446f26e19a5972c
-
Filesize
9KB
MD53f0b6b6e491b0c0a684bf55117f9d704
SHA1ed3c203b96efefa712cfe23f6e51b27c0c2e5c7f
SHA256351c053c7e06df103c3d2aaf04d7f83db48b5fc8b7c7bfea4aafb96b0be7e20d
SHA5123f7a6203ffb8153bdbd3aca541d72c7139f38f40a36c13eda47698441b648fbaf9c507b207cc602fe9f65b9b7bc94e4e4f7ada6ba7684a3a6f451d879c57f428
-
Filesize
124KB
MD5528a43ab24c7c30bbaa34f806f22aee8
SHA1848f1ed2294ecec94dc7283c7a50e64cd0d227a5
SHA25643f2d8e4843b97f99eee394348ce3128427f6e17a08b48a4c47e4c891c376d9f
SHA512149965b98eb5f42da28c80d9969d8e952055b27938f713bedfe206ffd0ace7e74c7eca06fb1823bd4d5b564dfa1396f382db6c58291c839cf4b2bbe97cb61b35
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58