Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 07:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.freegamesdl.net/download/?Assassins-Creed-Unity-FitGirl_www.FreeGamesDL.net.part01.rar
Resource
win10v2004-20240412-en
General
-
Target
https://www.freegamesdl.net/download/?Assassins-Creed-Unity-FitGirl_www.FreeGamesDL.net.part01.rar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 744 msedge.exe 744 msedge.exe 3376 msedge.exe 3376 msedge.exe 1896 identity_helper.exe 1896 identity_helper.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3236 3376 msedge.exe 81 PID 3376 wrote to memory of 3236 3376 msedge.exe 81 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 1152 3376 msedge.exe 82 PID 3376 wrote to memory of 744 3376 msedge.exe 83 PID 3376 wrote to memory of 744 3376 msedge.exe 83 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84 PID 3376 wrote to memory of 920 3376 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.freegamesdl.net/download/?Assassins-Creed-Unity-FitGirl_www.FreeGamesDL.net.part01.rar1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67fc46f8,0x7ffa67fc4708,0x7ffa67fc47182⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12252575658820291616,13346245269275645500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5b3a104b55f3db5553da57fe87a7df4ef
SHA15fda2eef7173d60386e6b801606241699c082182
SHA25645fde4ff4df78b4d5405ad2d3d57ec276ec308e868979a66ba2b5b933386e6c9
SHA512eac3cb956f5c054dc3b54182ac407175ac21943adda06add335c272e74d78cdfca3d0d46b96a299dff5e0858d7ca75a77a848a6ce8062a57643af7e5bfd70015
-
Filesize
873B
MD5c37fba17e5c23193305a81969b57cdc4
SHA1d11d143b8f5abbba7a1e06c3235abf5ad23e8bbd
SHA2567cc4209c1d9a89fb76b1a01a67c79cd798075eb9181ab3df4419f873e3f42b37
SHA5122e1317d0400dc5f1c917e67686c4583e8dba11d998b5339b67e8c4f044e5f5f48ab3d1a732b14c3a956b2d2ae3cf4fb36afc98d194243fd764f6dd7d6caf4db6
-
Filesize
6KB
MD5884ecc22b859dbaffd815d0e54f9866c
SHA1301a42f127b8f741188e762d0ff2337706f3d806
SHA256d66e66ae3b19f998eae7a4ef3f7214e8a1c02ae3adcff5439c5507a07441854b
SHA5123d8626a9d890ae31a745541e974bf9b19b2215cc2591bafe84923f933742db651c53e6b9f0efa9f22887ffce3fedf14a6d81264d0f689ebc7dad1bccaa56ca17
-
Filesize
6KB
MD5454c01d22d48ef3979e363e4332301a9
SHA16265b296f639a179198f7cb9b5533fc0dfd88b14
SHA2564cde1184a36787a85c730690437edf6bf2b16f0d320246ef4ee05efb62463799
SHA5127473ac132282e070ecaf190802c819b2990830d8685325993edae12594d71cc34605d2fc4a9d01ab37580f30fca2ec25001ebd4374ff6363559c69c7c9bd08e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5902f37c0be6e7aea830a08333d3e6c98
SHA1595fa66e8bfda54caa5a7bc242e39754d7bf190c
SHA256753352cb870ff2a527dffe0bbc243f8a9007aeb4d7d7f670e4418d65fc08e819
SHA51284f71e006e9e59f77a05afaa97dc91f1061bc0e11269d674f17a0f8e44e4f005617b1957e3250b54cef7720be7f7e6e43559e1b3e06a9bd6d16328c3c9c890c1