Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 02:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sansirooana.formstack.com/forms/la?utm_source=hoobe&utm_medium=direct_link
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
https://sansirooana.formstack.com/forms/la?utm_source=hoobe&utm_medium=direct_link
Resource
macos-20240611-en
General
-
Target
https://sansirooana.formstack.com/forms/la?utm_source=hoobe&utm_medium=direct_link
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133644473894228679" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 948 4324 chrome.exe 83 PID 4324 wrote to memory of 948 4324 chrome.exe 83 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4988 4324 chrome.exe 84 PID 4324 wrote to memory of 4672 4324 chrome.exe 85 PID 4324 wrote to memory of 4672 4324 chrome.exe 85 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86 PID 4324 wrote to memory of 1948 4324 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sansirooana.formstack.com/forms/la?utm_source=hoobe&utm_medium=direct_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3aa1ab58,0x7ffe3aa1ab68,0x7ffe3aa1ab782⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:22⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4308 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3232 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1896,i,5213233892531026792,18128648370262404325,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5c2015a69328576faf08fa7c17b318316
SHA159c569ca4fb0748e6851f74cfe12762f1e61ee67
SHA256ccec3389f77bb1e39a98f401ccdaaacf2fd43d90efdfaf0e20db03912b646a64
SHA51223f5957eff4de6089ec6397ca3083c85d69c62f305b1fb2f132b187a337d14bf519ac1be1efb089b03d5a5d4436515439fa9cffb81201c41e630f1aeca6549d0
-
Filesize
2KB
MD552e6e088caab1ee5abee575fd4fc9089
SHA1850b49ef76d939ed6d4152df91dff7c1859a0a33
SHA2564cbcec4e1598d23d4db368c170d1ba6989950b171e8dc17cdb9ea498db1875cf
SHA5126569f3cf0e76bae350a0a7d9d8acd3efb13ff32c275bffd80712ae68cab66feefeaa4815fc3c9fda70e96ef28da93c655daf754399fd739cbb3391676641bd9a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD51028339e7a07a9bf80186fd727ef4d72
SHA14e1a37fd4bd2105c19dc24e496ba7940d8b9329f
SHA256d55e4a60f62726bf4f4efe18bf76e2854ed90bfca84a31e2f99a1b54c139b427
SHA5125ced6a8d6aa6583b20d755d70088e1039041afa79517eca42fad44dbfc9c983085a75dda0efdf5347bb3dc940152f81e595f48cd37ff2dbf220b51cb0bc7e2f7
-
Filesize
7KB
MD530db657b8b355bb985fd5efc46693ec5
SHA1aac3c554a84005fdd7e84f67584d722186614e1a
SHA256adbc641f9d105bcb159e739ec64566d35ed91e5ce3190b2de19eb7ba86114c58
SHA51232ea63a827db90d8bb598563ed61899e8da81fce1a220347592723791bb8e93d8c812a72f30e5673cad3fac3403c1cb98c71ece51006e40d1e8a4ba0c2955ac8
-
Filesize
138KB
MD5f899c3ccf21cf1de61515f75acf5344e
SHA16f19202b0c7698da9c9b4f5108c0035f496916c3
SHA25698901dc50342f34c055e7361d41c6ffa4de8028af319f4bbe4752248f9632ee4
SHA512c65db921e241429e6638ac86f7acd146c3808a347b297f94d9cb34bf257433ffd04cc4cefd70633d7569189560cb8835f6eed9cae56f8c4204369b74d1ac0cbe