Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
04/07/2024, 00:14
240704-aja8yatdpj 1004/07/2024, 00:13
240704-ahtc5atdmp 1004/07/2024, 00:12
240704-ag9cysvgma 1004/07/2024, 00:05
240704-adjywstbnr 1003/07/2024, 23:40
240703-3n1cvascrn 1003/07/2024, 23:38
240703-3mqr1stere 10Analysis
-
max time kernel
235s -
max time network
254s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 00:05
Behavioral task
behavioral1
Sample
Lowkey/Lowkey/LowkeySpoofer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10v2004-20240508-en
General
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
990bb1210323b8968b180576cf8114d6
-
SHA1
a4e11d7cdeb37fb32d768085263ff9fd4e51ac0b
-
SHA256
b4a60b0e4f82707a8c5fb7f3fc0cc78576c7b45217617185ab34a90e2e052208
-
SHA512
43d1e9db58d160b15d6daf5677f2f63ed8f3fa494a886bf07d229829ffc84af17f9c81f61bdbf23dfa54a1bebafa7e562f805848b64de08bc8cf83fe98a2188a
-
SSDEEP
384:YGC7RYmnXavkxzG7WltcrhntQ5saa2h12VA:YGCuvk8WltcrttQ5saaCsVA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1092 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3832 1772 chrome.exe 102 PID 1772 wrote to memory of 3832 1772 chrome.exe 102 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3732 1772 chrome.exe 104 PID 1772 wrote to memory of 3280 1772 chrome.exe 105 PID 1772 wrote to memory of 3280 1772 chrome.exe 105 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106 PID 1772 wrote to memory of 4892 1772 chrome.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:4564
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd16fcab58,0x7ffd16fcab68,0x7ffd16fcab782⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:22⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4420 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4668 --field-trial-handle=1932,i,14013118761546554555,4903269209340586646,131072 /prefetch:82⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4088,i,3549704109630749084,1975543916261970610,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:81⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5a211fe87820841ce2679794202dc465b
SHA1a0b7ccc116d4052008284a9208b423bfdc7bee35
SHA2567248389423765d9be199fe1933f9d029dce511d5606d3dca04e44fcafe64bafd
SHA5129dda1084315d42be71b5efd69661bc919cbeb7b78e2d04c150da3c0478da509f54fd4a1e949c6f01d3d1f03f8265e3a5d07a93753128feafdd72bb27ec482c21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57aa9e67eed85062d2b213b5be07b5b9d
SHA182523215c290960040c8b565de767229f2be2738
SHA2565afe07ce1a68cf4769aeab207dabaf234ac6fe05e3a5a10cede23d39ac3b242a
SHA512c630c7182b647011d24eb1214a7b8c7579efbd3ac0d0d2ac7b4ae991be496b5dcb763f58f02660adfd22b9426e876eeaf84cac7b68310a023629e70d8b667e42
-
Filesize
6KB
MD5a5e8aed485d7d7a4192808c0e8c1fe12
SHA1c57fc82321ba81f108bcafc6c47bf081dade1b7d
SHA2560871056b9c5fededfb1dda602cbb43540091ce95bffeaaa58ecf4a87cafa2e3d
SHA512e69ec8c55d9fad2b230f9b7469ccf0b10a2c4377d5f2dd3ec4a4e089124d74ff84cffd57657aee67fc1e4c808197391012c3d550d6c92339f7cd3b556a5b033c
-
Filesize
138KB
MD550260091d9eeb1de2cdc7f55430ea6b3
SHA187568450e91d8cd600aa25e7319853c542b54c0e
SHA2562f698436b00d03fd7057d482de2d54b5f5edd79939c416e52e71b9ddbb65623d
SHA512ab2f70c033ef43551443563495cfb5820420d33fdfb969501fabe695bd1f45979187c291c0c397765cfaaf97e2d60f5d81bd36a4800b3b8667ef1ffa8087b985