Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 04:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hairspring.com/finds/740-056-a-lange-sohne-datograph-perpetual-tourbillon/
Resource
win10v2004-20240802-en
General
-
Target
https://hairspring.com/finds/740-056-a-lange-sohne-datograph-perpetual-tourbillon/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133723169452583985" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4464 4292 chrome.exe 84 PID 4292 wrote to memory of 4464 4292 chrome.exe 84 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3672 4292 chrome.exe 85 PID 4292 wrote to memory of 3476 4292 chrome.exe 86 PID 4292 wrote to memory of 3476 4292 chrome.exe 86 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87 PID 4292 wrote to memory of 1536 4292 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hairspring.com/finds/740-056-a-lange-sohne-datograph-perpetual-tourbillon/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82b2ccc40,0x7ff82b2ccc4c,0x7ff82b2ccc582⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5008,i,9769726035576779540,4231422053262723085,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53ecdc71b7d09a55d6349ff37bbfca376
SHA19524ba9d1b36d4e1ddb5db32b68497262b03e978
SHA2562ea135148692ab7d597cdc51afc76e36f90206311e0c4feaf51efec4f93a9baa
SHA51253740557f00ee41247661347a1c690ad79e389042fab28fa29e2a9724d2e88e8ca23a6f4f97d2b74f53fe475b61e99c35df06088d315a5622b34c38d77c3dc43
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
1KB
MD51cacdd1ede87476b682f9628be2b5970
SHA1051096c13c089e17f1037f07a82be3b5e20cf574
SHA256108c11dd2b431ec930369719b3f156af2b05dba7a6702c6cb0654b84a9266646
SHA512d165cc675b3a36b9524d36387b71f7fc6c911b6b2a0a65bd147b17913aa314643c69f7610b46bff9808ba678ea1fc32135250fdb66d915a8e148c2a78c4205ca
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5b3f11db46db006884fb3abd221e1c1a3
SHA1b052779ecd1d7ee19e5c19611321f3ab8b9bcd40
SHA2566d4b007c3c2c9a5c4d534d4805e4bb00acd593f0345b6dcd574b9c8537c320e6
SHA51270998f7f8ccd3b6a3308c31828c43bc30e322b8037aaa325bc94bf40237589389a84a04ee441337e6f1a8db55516f7cb6c4a25b3e3e38d76ea2abf28e3492e23
-
Filesize
9KB
MD569197af0d00cf8eef4babdd59c0428ef
SHA13841fdb11a906a91e806bc9d33812031a8f56a20
SHA2560dd50e41a7ba85b4f12f2e22cd9c835e0dea6a6cd4241e41ed51c26c0541ceaa
SHA512bbdc78b61029fc17a08958f17704dfed998e52277d8bf326b7332d8af767f3bc6d8144d6a824e14d33b84ed4e189737427228e949fbc5a58364f9511b75c8801
-
Filesize
99KB
MD59d4e2009c2c5cace9d7bf10971da0377
SHA13a759c97014f924a002f11ac537a7dbe589246f4
SHA2568c73b0f12fe1615afc743d0939a1b1d517b77776391dbaddc4b152c499709494
SHA5123d02b21992b0773ee824828f1ababe2e69b0a523093eca0bf55d0c03d7f7ed2658bef63af2b574762f40dd0c7e3567a57b17e0d1ff3a40e0ade1904eb95419e8