Analysis
-
max time kernel
20s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 13:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://openiv.com/
Resource
win10v2004-20240802-en
General
-
Target
https://openiv.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133721755682489982" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3376 4924 chrome.exe 82 PID 4924 wrote to memory of 3376 4924 chrome.exe 82 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 4800 4924 chrome.exe 83 PID 4924 wrote to memory of 3616 4924 chrome.exe 84 PID 4924 wrote to memory of 3616 4924 chrome.exe 84 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85 PID 4924 wrote to memory of 628 4924 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://openiv.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff81a28cc40,0x7ff81a28cc4c,0x7ff81a28cc582⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4348,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4992,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5136,i,416579702959819314,3056050529128707893,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ab131bfcbd52e9e89c71fb1f350bc696
SHA106c3e201fc9bb91ef9b9b88e3c45600b25e2211b
SHA256f26c6078ced1005ab3b9a2fec043dcdfda4a5dbcde42beb551e2fa8a56ccdf97
SHA512d05788abe7b7f6fcc33eb810108d0dfa073d4be2a04753d2f557509c1c560d810bf4a7caa727fab803c64c06ee825b64b697439e71f5c721048926163b3f39ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5bbf96dd6259c9a6702bbf1be02c3dcd4
SHA167b8628688c5edbc638c6fe3679243ec520e1bde
SHA256f8862c9313b220569cf9b52d7e53b3eb95303f0085abf8769b8cb101fb4171ea
SHA51229f31b8735d369e63f3754ae41443ee5a54c116406569936763cce497dea09720141455cd9b489e707c03d8f0c23b21556f5ec7d725c5399ea4704a601da4bbe
-
Filesize
99KB
MD5ab5a3913cd69146a3d46de206a78b90d
SHA1a79ba8a80bec7fc04c2951b126b67e65f81e5cfc
SHA2569d6176b560f565eb52926af91c994e6491a1cf7e7465e5a17eb6971bde80911d
SHA5123f5cfeb70fd28fbdccf51274a2755c217e2810348d4780b6c22325a4f60249a6872c777040e76974600a63b33392b6c565b134124084700d441e284b3f5e7462