Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 21:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.freegiftzone.com/free-google-play-redeem-code-gift-cards/
Resource
win10v2004-20240426-en
General
-
Target
https://www.freegiftzone.com/free-google-play-redeem-code-gift-cards/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598510441178742" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 chrome.exe 652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe Token: SeShutdownPrivilege 652 chrome.exe Token: SeCreatePagefilePrivilege 652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 804 652 chrome.exe 83 PID 652 wrote to memory of 804 652 chrome.exe 83 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 2012 652 chrome.exe 84 PID 652 wrote to memory of 4264 652 chrome.exe 85 PID 652 wrote to memory of 4264 652 chrome.exe 85 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86 PID 652 wrote to memory of 3616 652 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.freegiftzone.com/free-google-play-redeem-code-gift-cards/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdcb5ab58,0x7ffbdcb5ab68,0x7ffbdcb5ab782⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:22⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:12⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4752 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4748 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4492 --field-trial-handle=1880,i,3854753182201209743,10354426679754332337,131072 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD551a9fac6815e0ee9b0b9303c4c10cd1d
SHA140fa9a4f1b17fc827ab73ae106633ee6d063099b
SHA256a10dec966ff61d2d15b49ebc3c1c6c4562f64f55072b878a18eb23b67a481cb8
SHA512954e0ff759e3c15931de177f7039a034bc39266d831f8b3ab66d8e326f031d43ee12d4aa3f38115bafd6d7b495e5f42208ad2126a74ad1736277eda7c1da3198
-
Filesize
64KB
MD5475b50689dfe5ac600b3de04ace088ea
SHA1fbb328c285b985d98e436e1a2025dc2ef814f08d
SHA256bb3580399452f7fc44aa591302242cc83e1a1c5daad646fcc2d1d3e81b9b7bc1
SHA51255bef283c23fe00a25ab86c8e62df455236bb4a114d72da8986d0ab51b46567f195d35f94de1e133ae61e95d121de99938aa02e80abfd38c3c841fde9214c381
-
Filesize
19KB
MD5fc47b08617b08869c9c5f5f6a5c07f53
SHA170366b3a8cf99a7b1c135bfdb0b2ede1fad91e6f
SHA256fe93c85d8bd89371a90833d1402865d3c5a6866b7d6048570407c209a1b8dc9d
SHA512b519f8a1a915bc2c7f15d9881bc2f4278ade1a274467a769e3f3ebf3239ae836649c9aec92e718c798063d5f841f5fc1305c3067fa961226c0791111bf123573
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
685B
MD579bb50f4a12cff9d2fb84d59b5b35f64
SHA12af3fc7ad8274a9c242957f83f25a1283f1f2efd
SHA2565cb6ee4649c5e527d8640af57a1558b95a582ee623fcb0b2dd3db3905cdd3b4d
SHA512b481de8e4ce4791c5b80842cdf502995179345768af73b029aee9d433d55a42093f85d7a47bf0de10d4c55fed010fc2d83ce1c916916186eb01c8cd87f492530
-
Filesize
685B
MD56612563349b1b51f6d34b7d24d584c03
SHA1c8c50465daca26a11ec590a7c0eb9f8233affc5f
SHA256fe8635fcb0b0b0893d30ca873743fffa828cc327e80531215ad83b2d72130646
SHA51214ddd417fd93649bba031c1ba1e59f1b77bc4d351857cc0a25f651b88be8ed2d3ad7cfc7427eecaf5b52591b39c0050a291c1e993f07d7cf6db8b2682da263a7
-
Filesize
7KB
MD532a717435e965d4fd1620ec463e46fa4
SHA17d409512e859f94b97e6c87eccb2cf5f9471fa84
SHA256888d29cbc4db993b72902c5db6f74b34becba150a76ea6d2af9fe20e21b1f3c7
SHA512956fc4413e4c518f97b01d855ba24c8a8765ea4f5c7963faf63ae26afc2fa3fe177ae7a75de977a5463829bc38a80f5c9108b7ed4fea875994b71f53ddc5d415
-
Filesize
7KB
MD57893bd58ff3b95209fef8c73ad765e80
SHA166ae939df4465e8dc04a21bfda40714329356cdd
SHA2561fd54fe6478d1251d1503e765aaeadeb183f3f2034cd4f279abb90d6842f1ab1
SHA5121f08e9ce8a89e5b382325df0e12738067b0bfe56b6412507310170cc35da419d502af6856d6678bfc13ca3f41536d5090bf27c9ea5c2e6c4fb2db4d7fddc1df6
-
Filesize
130KB
MD512909d071772f5e497a2cd7845b7df68
SHA1773f5e00cc5ff2c211137b018e74c25ceb812eb3
SHA2565c1a4650b1b6b85d1ffd9c6002f4b625cb69f10719332a947421e612afda26d2
SHA512e0659128b1b29f9b010543d532e9a056d3462535651a7cc2c998dbbb214f9b54dfd4d3aac86354b5b3fced59a69fdc13a94221dc009d230154668c48352a5c0a
-
Filesize
130KB
MD57f8c62c8f2a097a3b43c5d0b901ef315
SHA1f90be4e392feac63b37e40a40468f78127649577
SHA2564b453585365486fe7480bc34d89297d5599992e897627ea54b35db61840fa420
SHA512e46af67602d7e7e441f7305150190d7da239ae9426805df8705684fbb8211e13c0f60dede4467d311867f30c3f908d4c3a2533b8b428a1f1bda727de5f72f916