Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
491s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2024, 23:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1260676861445410820/1262400106712399952/hooksense.gay.tulontop.rar?ex=66967537&is=669523b7&hm=fa364f381a161039650667bd8d4b05cbeb5d872fa858c4b26a5b74b33821d032&
Resource
win10-20240611-en
General
-
Target
https://cdn.discordapp.com/attachments/1260676861445410820/1262400106712399952/hooksense.gay.tulontop.rar?ex=66967537&is=669523b7&hm=fa364f381a161039650667bd8d4b05cbeb5d872fa858c4b26a5b74b33821d032&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133655605033190031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 2436 chrome.exe 2436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 5072 4240 chrome.exe 70 PID 4240 wrote to memory of 5072 4240 chrome.exe 70 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 3968 4240 chrome.exe 72 PID 4240 wrote to memory of 4220 4240 chrome.exe 73 PID 4240 wrote to memory of 4220 4240 chrome.exe 73 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74 PID 4240 wrote to memory of 1468 4240 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1260676861445410820/1262400106712399952/hooksense.gay.tulontop.rar?ex=66967537&is=669523b7&hm=fa364f381a161039650667bd8d4b05cbeb5d872fa858c4b26a5b74b33821d032&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa7d179758,0x7ffa7d179768,0x7ffa7d1797782⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:22⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:82⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=908 --field-trial-handle=1696,i,3210315268628403290,12330983125442227890,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD522a3436837514226d8c9296ef72e1ff1
SHA1d4fc9b55b28e9a96eba92fa0c14d9fa52756d9a6
SHA256ca6f9a1a1acd6c33a277460828b565905308bc70eef33f598661f4b5759e2ce5
SHA51284a40a49eb856760ad9d96cc65fdde993c3dc25cb9c65c361862c05b80fd56fbde5d7238b7da64c6ce879e7caf705fa46ce13ca50b1598aa5281f15a69967133
-
Filesize
5KB
MD5799d444cb774d81d1c481ec70d43b225
SHA19234d1e5e51bb541947be0b11fb5e1cfe438c293
SHA2567a4b0bc885b0eaa267ea9f2f73cc0d3d7e6b7d66b78063e6a0c9851aa6bf4d6f
SHA512dfd10ec53073ed6452ff6a098fdc3b6ab5728ace2fa5732cef590899d62a9e06c16319f20607d61cc2720d112476eec5e6d25ca33ab7e0100faa6445c589bce3
-
Filesize
5KB
MD5122db627eba573d6bdc8b2d0efa7cdca
SHA1c2926703bad38d6d6ec7f98aedecc5df49ab600d
SHA256847556ba878810f7b7a9d1f87bd29830e43521b638e5e7d1c7b633220524b3a8
SHA512974ae9d5e6f358ee9126639e7fb9530ca699936d331a9024fc9719b474200da02e28d2e3e2683ca7225fd06d3657fc7194ba098adc25b17ccc6e9f538aa4b022
-
Filesize
5KB
MD5b785f5cceec39e82d715c160b0f74279
SHA1dbd95e83ca1fd8dd3406678f61a89d26cdd619c1
SHA256e6919c616afd298f9c1562ce2c019427e45fff89818022b2b836dd01fa69f0e9
SHA512c0a232ab5bd2aff5a5218cc8e20cdb2bbef22fe75de651858f3464963fa22a84315b8173a524db7bfc36a49e00cfe1812db294c7e4772172ffa71ef51fe9767e
-
Filesize
150KB
MD5c9ac0e1293ac6f1d6bd10f7c909d559a
SHA1520ec118dfab32fbe0e695014d3a3194169b6edc
SHA256fad85b5e69f998496ff09b345df3fc5f42917e409400ece20420d2769856bf2f
SHA512c8f59b584b9a8cf50e22785785104ca2e124a86033e93630536f7be80d92f091d00ccc6e06eaecc209203ac8f1ced94eb2e91750df359dc9a7f297083ef7404e
-
Filesize
150KB
MD52282a68c0493570fbad04983b918f45b
SHA19a7b13133edb23b29c186f1addde06ca758ed51e
SHA25642c2464a70c8505c7b9ee4a7b9bd177b3a3f1e32085ecda211dd07f568092177
SHA512f26fca4e61b063fbc5485a91afba5376f9484b9656fe7eb8b84972165f12e2ba7ed7cd95b9b03e4c7e9a2200dd065128a8e5c85157165fe5f778959b5fcfc2a0
-
Filesize
150KB
MD5159162813a5df1437c89d0b5d9d86f7a
SHA12d638a05857dc7db11792c6c43eb475c1f80f2cd
SHA2562ec104f22bd1f01629d68a7af790c181d65920508ca4191f9fc9430c004958d5
SHA5120e4e6167a690c50cb7779fb492195323ccbae9de16fe4030f0deaead726f114d6cd3ecf768147af5e21b6040ba05069d0d9bf932e1e867295b1afa23b6553c98
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd