Analysis
-
max time kernel
155s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
hookfor60.rar
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
hookfor60.rar
Resource
win10v2004-20250314-en
General
-
Target
hookfor60.rar
-
Size
5.9MB
-
MD5
645eb7ce7ffa114153dc1b67fa157d8c
-
SHA1
b900c6f09c33409d844fc19c7aaa309e3520bb0f
-
SHA256
77f155b8f6e0aa230e69aab203d4cf3f2d4323a30c4e876bc9ca9f0cda11ae21
-
SHA512
26d62f9dfc65e40b56ff3ea950b0c50dec852062f236252636c6b0e78c55a7feadc29ee5f88f27f042f6ed95850a64be47bfb244fca173ef8d10e39eb4d85588
-
SSDEEP
98304:HhigvY/b2Hs3EWLYWrr0hslpOgiXfH/ZMjadCet7UKnPnmQ9mKMWZf+oFX3j:HhZvQqs397rr0hslpOgmffZR2KnvXR2E
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133870532062933158" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeRestorePrivilege 2984 7zFM.exe Token: 35 2984 7zFM.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeCreatePagefilePrivilege 1328 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2984 7zFM.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 372 2540 cmd.exe 106 PID 2540 wrote to memory of 372 2540 cmd.exe 106 PID 1328 wrote to memory of 1472 1328 chrome.exe 110 PID 1328 wrote to memory of 1472 1328 chrome.exe 110 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 5480 1328 chrome.exe 111 PID 1328 wrote to memory of 1700 1328 chrome.exe 112 PID 1328 wrote to memory of 1700 1328 chrome.exe 112 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113 PID 1328 wrote to memory of 2740 1328 chrome.exe 113
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\hookfor60.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2984
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\curl.execurl2⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xfc,0x124,0x7ffc585ddcf8,0x7ffc585ddd04,0x7ffc585ddd102⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1896,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2272 /prefetch:32⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2404,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4188,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4208 /prefetch:22⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5344,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5552,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52e77ebe71cc56439c22a6270e3049682
SHA19d88f89c1d41d39466452680d694c457bfcae354
SHA256be4c3c897518f80146a226db77521ad5d3876d177f0cd241ae18e1712901c730
SHA512050f3a3d0db4041748eb5f9732dc086a4d37b81ed97f3592b4619aea9456b17e537c936287234ce443b8fba8ecef0d75d7b09ee202ea546aad30ee8bbe6a4bae
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5b5ab2b3ab9c363a09bc1c9190abbff29
SHA11411717fe83c0d86fdce4f6debe160816b8efeaa
SHA2560ec7241393704c30fd49681ff9bf5d706094e13536fb9dc2e654c57eb8cd7207
SHA5124437798b503aa0a0fd4949bfad2ec04efa57f11d3a160c3fcdfa060641dc1229854a5189e94480d72ae791dd70eec549a59fa509140d0a9996dd0c9c36ea15cd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD50019378c861ed76aa0741e7c642324f3
SHA1715105e040e5d714b9fdc92abfd8b6f80781ee14
SHA2564abcdbf81062ababd7f5bbbb84c5a7d5fb25f1395527733004f47a3aab70efdc
SHA5128f321fe97e04a8353f86ccc78627251e162c79a173af08039acfdd9df946cc4dac559b7b433213850496b376ab2813066e8c44e43bddcd982cbfdd25d1f95560
-
Filesize
10KB
MD5a2a6dcc73578f2d60ee50637244789b1
SHA1f11be2954fa97ff781f289adaf128f552a5ce3ba
SHA256cdd6bca451bf0a63a48fa620f1654d095599cf4c7c8f22fdca2087d059b5d095
SHA5124ddc7a882fb301745097d901db99518e38272f6fee8cf0bf7d013848a5f7b90d9f32a4bb8252aed1c80b0821f8243845e95698e35acb92c118bfa0a3f0a080db
-
Filesize
15KB
MD5a73d514daff437ebaadd6d5bdc9baea6
SHA1cf6d2e3aa1f384a598293248e600b7d5370d7f28
SHA2560fadd861882f4617b5c814604d34349bea3eb269f92ff29cdef11c21cbb22904
SHA5127b18a6b40e7b84e4ffb76e9de0ce579facacbcff5f7de0f3f67db68f1a4f816fc3e2db257e888f69723f617f94492c64ebe1e6cb92572af18a6e8e4746eaf42c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d4c8805565e1edf56e68c88c911bf974
SHA1e7bb3412efb13868f2c46728d327a33be214cc49
SHA256f11e55756bd95123aa3c451b06b1ee8256057f91f9a0acccf7b6761ddb4c3e05
SHA5129b500ac03c9d750febdc3ba2c5edf97c6021ac258f50ccd65c44c18a6d8cfa8705e88a7770dd295b94e8fd4f20aaf4f5809230477c664e758c195a904dd2737e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ecc1.TMP
Filesize48B
MD576e9049bef5e20dfb56ff48d74be083b
SHA1ceb8a2179d790493a81cfb9f47a6609f51162e55
SHA256a3ccb4aaca98e55131b7326470323755eb4b20313fa1a8bb50df1fb12c327a84
SHA512bfde6f951fc8298555b50cfa83491ac0fc5ae749f0b36f3993e14849108b50254e458fab362cc1501c4aacfabc8a3f35f298994228c0a8e8d0d480e4c45b5c88
-
Filesize
80KB
MD57cf9a16ab5e517bf1bbddd4c51da6adf
SHA1599fc4a64c7424b8a23e6efb4a3b8f03ff8dd8bb
SHA256b254edb60602178f25c9020ec6fa9d026b0cc4876fa8cc0cbfbf3a0e625d14df
SHA512e188eaaa49aec5d3babc576b687e7d91b0dc778cb10e914a0c2f38b75f1efd0abd06aaa1b6e982887d341d6a9a90105984c84d158d925bf29a8533188c83187b
-
Filesize
81KB
MD5e5155ee10d885bdcc55eb1ff0b5eba72
SHA11f3dcfd1a83ff6382bce33b8619c5ba5e9bddcf6
SHA256810ea148744e47b4999bbc7785a9a2614562ab937b15ed0e71c66bb882f63cbf
SHA5120f925681d79af6f1ec063c66cf578a387736eff7e96093a62097ee35ec511ad5f3fdb5646d5ea425e5399f5b9fb1e740a92ea10423214e382433eb519d428ff1