Analysis
-
max time kernel
188s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 08:55
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://erp.ivyacademicnetwork.com.pk/vendor/repos/[email protected]&file=1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://erp.ivyacademicnetwork.com.pk/vendor/repos/[email protected]&file=1
Resource
win10v2004-20231215-en
General
-
Target
https://erp.ivyacademicnetwork.com.pk/vendor/repos/[email protected]&file=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133488322335794137" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 660 chrome.exe 660 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1380 1740 chrome.exe 15 PID 1740 wrote to memory of 1380 1740 chrome.exe 15 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 4040 1740 chrome.exe 51 PID 1740 wrote to memory of 664 1740 chrome.exe 54 PID 1740 wrote to memory of 664 1740 chrome.exe 54 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91 PID 1740 wrote to memory of 5000 1740 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://erp.ivyacademicnetwork.com.pk/vendor/repos/[email protected]&file=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8f699758,0x7fff8f699768,0x7fff8f6997782⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:22⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4920 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3788 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3352 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:12⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4528 --field-trial-handle=1896,i,3256675392490522720,7932636442567090790,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5797404d81ba03a5adcc03675c7965f
SHA19d74e368e933ce8648062aa9f5725bec1747a05c
SHA256a3cf4b5edb1f24821688abd6010e64509957d003f2a1ba24ba27a43d9b40883c
SHA512a3e00699afdf0c29ff7f0d3051c906196aaee97b18da98c16a41c226f7a99a01291343e573b4f8316f2ad7839bcf3cbada7c4901c31a8f0b21ca102a54dca3ae
-
Filesize
6KB
MD5f39ab452c6fb7a7bec9a90cccfac2a0f
SHA1d49b761304ab302a8889fe136e6e862a2723695d
SHA2563684e5dd625dcdb7bd893167ba7cb3fbf6b86a6f274ed32fa13952170abd4eb6
SHA512a19149d7b3d7edb09d2c2f01669d1e292116d850b6de7f669dd1f88ebbe4156057a45eb6749ffee81768681c96337f6424df8be1212e69656ef34d3163f7c431
-
Filesize
6KB
MD5feabab151701c7fe8448d78249c1eb82
SHA1e7bf146fef31440aae7d80b6ed6b23e8e36bee7d
SHA2563952221efb605aa17e1a4390f21157ca3271d2130c624e62244f3690f894b386
SHA512bc05a4b72485d1e4fa3c9eaf10ccec790b218a493055d711c5afae0856e5d913201e0fe6e64850f68a51e25077f43e4148dfddbfb1693880795e79c97713dcc2
-
Filesize
114KB
MD59470b416f4c20f5714f7174cfe5b6260
SHA13e6cf8761915ea247656624632d59f9c7289a7da
SHA25648851d1a01ee63d3073a448ba0cee789d94e6bcd4531cd2f8a7af19b760e7898
SHA512efe5f921a8f478ae022fe7d7a39075a6fe9857a6090827235438a4a0c380cbf06f363a2e929c95b8e25727a3956ea01def309ada779e762081395fcee0091c9d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd