Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
freerobuxgiver.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
freerobuxgiver.html
Resource
win10v2004-20240508-en
General
-
Target
freerobuxgiver.html
-
Size
12KB
-
MD5
e98ef5b108a4045ec187888bf6830e7e
-
SHA1
6a09ef0f9041e6364670e5f33193b552c4022fb5
-
SHA256
8dd207331e1f51bc1518216d1e6e13e9e7e21cbf5713fd6c3073e339d41949ad
-
SHA512
64e6906e126ffb2c0d9d22c82674a40e2fd87634ec4d0a2cd9cb3ec53530e5d8bf0e931194c75e8722a61235f1fc1ee75d212b38c190391ef2a36c95384731c5
-
SSDEEP
192:O93nhybSPU3AcOvJK/ypAV9dDQ/ypAV9dD5kPw2APa79f8fJI49/+oEZ+/jNNXqC:O9kbwcORD+h+NRW4/jNNXq0Ohr+1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 3156 msedge.exe 3156 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 2340 3156 msedge.exe 83 PID 3156 wrote to memory of 2340 3156 msedge.exe 83 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 2952 3156 msedge.exe 84 PID 3156 wrote to memory of 4368 3156 msedge.exe 85 PID 3156 wrote to memory of 4368 3156 msedge.exe 85 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86 PID 3156 wrote to memory of 1012 3156 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\freerobuxgiver.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11433025106478471427,619844239761915820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
640KB
MD54f32d2867e1101fb2e4b165610103d1f
SHA10b814dc7224bf3d9b8af052be70b86e6613d63a6
SHA256c1dfc6ed046fe6c532fc42b1aaaa70d35c67e99d3b0a058b31347527aa645a1a
SHA512eba377631285fc55349ab9fc19b90769fa58dddfe9732bab961172de3af2ca59ea97c9b87690c5b585bbba91fe8de0fe172a794f4610b30938c7c4659752e906
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD589ee01a6864f740b220bb45991eaf096
SHA12a413c2145688c14b9a8e3b4df156e8898c3a128
SHA2569098080398eed0da9bbc0c563f2b997f96ab79f566c51093528f7817304e2a6f
SHA5129db2529433bb50e84ed839cb8d2b8284d6bd466f250bf49b85f37aafb60682902587b54fba16a8513803ad1eab92cb5c1b5d2e26b85f4b85db6a728b6d2b1a91
-
Filesize
1KB
MD5ed725363b805e007f5b92b78cacdbba4
SHA14a9de6ab525dbb41215988916336b11ee2520a8e
SHA256925751b0e6773d28372e9a5749257ecc545597a3ec053bea8b6e2f06cab54211
SHA5129aab3753d9ac46cf5e7efa51047da4a6ca90f24537128df3b3a1e2f2460512301ff151758f9cace65ca2cd47316e971edc6bd3e8dd49ed74d1f9237e68d8ae4c
-
Filesize
5KB
MD5f2133539cf05f51d0cdc6ac89e9ef90a
SHA15aa382f878830ea26dd4287495e418a2648830f1
SHA25669dbb92078cd5daafd9bfe2ab9620f81906658f5ee850beb1f71a4a5e58f932e
SHA51229bec8124d8899184103b7a4dceebebf052c005545a789a62aeb9fd236ed0f4270678708aa54bd3996086e8258801dbd4a6529f42109fa4902be70fdb84ad417
-
Filesize
6KB
MD5685eea96517be9aa74784ecfbbdf9036
SHA1da2e7d7c442039c2abf55025e117aee247c81360
SHA2562980f2b44495f2446c8218e1b1e6ba9d1bd1dc2d34f61ba3baa4aea0d5c3d7e5
SHA51299764e9ca49d23dbf01238b832c9b6c1d10028b691c6db3363288c1a9f25271be9a423cf85d8f16214d9bd493890af2887f4a0be2088ec38585ec135f4274bda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50439f6bb62d567c7c3c7129891b98857
SHA15400c7a663d36558651637e693b90d9a92b2d3e9
SHA2566f17efba33bc4487d0db66f96bdca0d748f42e58cd70522ece9ea2679d1cec4e
SHA512b31ecad4467f06f01bd13ffdd7df77a1e352e7ac5a620ee7a0c829bd6079d5d005530d81754d59e1660380a8981f6fcbf8672f10cf9e6ae1fb351e5e097f9143