Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hkcsl.guru
Resource
win10v2004-20230915-en
General
-
Target
http://hkcsl.guru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415601347191624" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe Token: SeShutdownPrivilege 1480 chrome.exe Token: SeCreatePagefilePrivilege 1480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe 1480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3900 1480 chrome.exe 36 PID 1480 wrote to memory of 3900 1480 chrome.exe 36 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 1244 1480 chrome.exe 88 PID 1480 wrote to memory of 672 1480 chrome.exe 92 PID 1480 wrote to memory of 672 1480 chrome.exe 92 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89 PID 1480 wrote to memory of 2692 1480 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://hkcsl.guru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe46959758,0x7ffe46959768,0x7ffe469597782⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:22⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:12⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1888,i,1029133038756882050,9358117174090148743,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5c68bbd80dd34d0bd3e47b0a081e13514
SHA1d8f127a498e577ffc01a7adc9f902dc900294a34
SHA2568d61717a90b5365257fe16e922f6c017c7f9b49297a850e8ad5a8e3637cf6d7b
SHA51202b377d5af9ebcd54b179965cdf991f2b3154b456824e4973b331dd63c4b754961c3799d8f7bf2f9c2dc4b9e22d1e216a21abfc55fe6a4741a0e8db8483e2afe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\20ca769f-8b0d-4db6-a0ba-db3a0740a2a0.tmp
Filesize1KB
MD515e0d07443ce86c9faebe032c6786b46
SHA130a2e6d104e09bd41607577b2adf47ede79a3fad
SHA2560e22e22a9a24ee577ddf74d220b462f1fec60b1c262fd237e61a2236788b36db
SHA5129e74818d4d1a64a38bad56563afdc9d8901c1e99f366d7a4c0a104804f79908d5e9d69dd60a822aca44ba6adf1a32faba56ad28e9549c75e6323bdec4890cb1d
-
Filesize
6KB
MD552e50b4a6b8bedc850f15d20f0aed06c
SHA18815b9086f97a375a4d69362904725702a6347ba
SHA2564d8247a8594f09de06f4c91a09a602c5983976b1252f2657b2666ac3f265a57c
SHA51209b82a1f88d4fa6775167f6863655c493909867f10064a7f90a856d425db8883d4c27cd7352806598d9a5867bcdb3cbcd08f650999375e38e4b015981da2362f
-
Filesize
101KB
MD57f52a8a73860152f03097bf252abd155
SHA1f310909b0acbd9a3d39744b92e26e0658fccfb7a
SHA2562f45676ca74f28cff58af1169f3201d591034e20ab7ce357d29156cf109275bf
SHA5128ff0e499b7e7f9b6fda94e17794482a6166b9a6bfe203c425b6eb10aabe01090ab898628d53a8c38879509fae7e3c699a235b69d7109e83342d04d46f60b9163
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd