Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hardoziaplace.fr/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://hardoziaplace.fr/
Resource
win10v2004-20240226-en
General
-
Target
https://hardoziaplace.fr/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571671135058854" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2884 3004 chrome.exe 84 PID 3004 wrote to memory of 2884 3004 chrome.exe 84 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4784 3004 chrome.exe 86 PID 3004 wrote to memory of 4704 3004 chrome.exe 87 PID 3004 wrote to memory of 4704 3004 chrome.exe 87 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88 PID 3004 wrote to memory of 2184 3004 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hardoziaplace.fr/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c0de9758,0x7ff9c0de9768,0x7ff9c0de97782⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:22⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4924 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4788 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4820 --field-trial-handle=1860,i,183822515708743915,140947397137527656,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5d27f804e538fdf9af0af8297a4a489f4
SHA18a05ec1a971d9445666195a5380da6c10d2c767d
SHA2565b308c84559a34e0e4361e889f6209857c9cae77dcd3c6b3b29280b20900665b
SHA512e8f8192d7e3db0360d30aba9db5f6dfe9f1deb8a7c4e3a5f3dd9170bffbd63e4f2956a5071126b864439869a6a15b94b2cf2f2483b0eddf2e7b8e78295591dbb
-
Filesize
120B
MD59f165feb530ebf0ee64c9fab2137b1b6
SHA1c6819955d87221aff58f49f413bd0c20367d491e
SHA256c0a54f3d59036acbcbc0f2e051a376b0fcd472e4333fd37d3f71c6e9134425b9
SHA512981bed6b7ca69269364174cc5061e6a8f87136a4212e13e6e81750ba6d296e92bedacd39838a74a75ee4416a2591cf2a17281a5994270e86a42d51b05c0ecf20
-
Filesize
1KB
MD5a7126ee007f5183cc2ccd7caf035d803
SHA1e4579229e2c9b272543536d4da92d926823ee20c
SHA25682ae6142454f991459643483b77c4782fb12f9c028827aac31b8c7d299b30c88
SHA5127691374bffc868a798dad021e45bbaf61888f27360fbc8b1eea8478423cf383a1606dcf31a2d4f62ee63565a2f7875b146856415ebe0fcb2b976371e41c5cd8f
-
Filesize
6KB
MD5ba50a8e16aef88ba24a0f689a1731a41
SHA11228566c12402a34fb127c6892c4f488a70afaff
SHA256261d48763f07e4ae3e5b58090493fcc993a9fe6b94c4d695b82fcfeed894203c
SHA5126428db5e35f2eb4bf7ad6fb88d27d7064c02f9a9f222d732ff7f612ab5d134df724e6eab5f0b97a72ffe99e2dda181bd654a9937b22e801ad99ceb6abc64254f
-
Filesize
6KB
MD54f331abc41a66b050c9e15ffd56f94e3
SHA116b0d8f0b73fc7b1134b19dad12d5d7224c31caa
SHA256d71ef590455b151963b84432a91ff5ddba042802a8abe0a30da13df66ed9b3eb
SHA512203f356729139a63e9e35cf459b585d48a59554e8544a305d7f311f80fe93bbf2e3827b7aaecd9b5bb80f6aabff1660c9613e5fc2feae17fd60071e9fddb2ae9
-
Filesize
253KB
MD5c1469f9d00665fa7c304bf438a81dde4
SHA1e59e1314ee2bb53d8248ddb4b2ba82984cdbf007
SHA2566693b2b20401a16e79b829eda5ecfa4a9a0541db213fc8c44009933a2bcd0ed7
SHA51250e75db3b5c6773c890e280196a3f9b0c62a67bda93ebee557f14a65a19bbb618440d81a4d9ea51d5a53172ecfc5f28296145919dd52edc36c42b6b611b1d71d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd