Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/07/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
free-bobux.exe
Resource
win11-20240709-en
General
-
Target
free-bobux.exe
-
Size
1.1MB
-
MD5
3c67644a790654bb073c8c141a64a28f
-
SHA1
bfbdef343aaed7265dc17fe8f93af03ee6ffff3c
-
SHA256
2841dc9b8d8b32e37db1d76fca0e09c201d96368525af5434e0854470477214c
-
SHA512
26f1da6ce3b3abf8bc97c3bc9ffcdb185a24189ea4ddefe3f160adbc280d0829d6a0cc74518c67495aceff2e93b16e353e369ca49bd7c3a78fb616ed36af5fd2
-
SSDEEP
24576:/jcBO/BgQiAZYr13pZ5qutIV88sUMwoEH47YEQKUWjjoehfQ:/jcBSZEPq968sUOP0EQKUWjoehfQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3480 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3480 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2960 2796 free-bobux.exe 82 PID 2796 wrote to memory of 2960 2796 free-bobux.exe 82 PID 2960 wrote to memory of 4772 2960 cmd.exe 84 PID 2960 wrote to memory of 4772 2960 cmd.exe 84 PID 4772 wrote to memory of 3444 4772 msedge.exe 87 PID 4772 wrote to memory of 3444 4772 msedge.exe 87 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 5072 4772 msedge.exe 88 PID 4772 wrote to memory of 3000 4772 msedge.exe 89 PID 4772 wrote to memory of 3000 4772 msedge.exe 89 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90 PID 4772 wrote to memory of 4148 4772 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\free-bobux.exe"C:\Users\Admin\AppData\Local\Temp\free-bobux.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\cmd.exe"cmd" /c start "" "https://www.youtube.com/watch?v=dQw4w9WgXcQ"2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/watch?v=dQw4w9WgXcQ3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff96c4e3cb8,0x7ff96c4e3cc8,0x7ff96c4e3cd84⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1408 /prefetch:24⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:84⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:14⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:14⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:14⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:14⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3880 /prefetch:84⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,503645679386020315,16739879261770854198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b0499f1feacbab5a863b23b1440161a5
SHA137a982ece8255b9e0baadb9c596112395caf9c12
SHA25641799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7
SHA5124cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260
-
Filesize
152B
MD5f53eb880cad5acef8c91684b1a94eed6
SHA1afab2b1015fecbc986c1f4a8a6d27adff6f6fde9
SHA2565cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27
SHA512d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794
-
Filesize
5KB
MD5bd49185690f9051f8bf717238e5bad77
SHA126a54e2e7cba2b69421b0f24a350874f084b2c17
SHA2566049a235eae4a5cc6150fe011c838d88be7da5236cdf6b257c2dd0967fe32593
SHA51219faa6875aaafa03ad5f802d323e083d052259a4d3b3f2dddd42504e0629e3ab2b99d890e12a3fcd9c8023a16545356fbec92b6f247a82d998314bd87900803e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5b93bf5901b6c57a091a06b2786a12e5a
SHA1f9fd3a4435423eb3567f2f4500cbc3a2bbd71c9a
SHA25682b545f611999039c4940d6f5ec21aaf8bb09d0264e2da3e717091b44d288787
SHA512b2a76699dc312e3a295ae5aeb94eefb2bdcb0057febc9c9873e84f098de15826b914db200e9dd2a21e564b00df16fb91c5302f77cad2f30ef1d92c50fad1e101
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD53b326d27809a3bb689fc6712749ec2af
SHA12445071d690d882ac1f589ab869e1654f51e26db
SHA256c678dde3c6d64742ccf9c3f0d1ba633421bc94cc28a0302cd7768a3c3abbb36c
SHA512b45271b664c7e222b8040e6e5a9db004ca953f62f254e4cfb57fa24d6780352e7a6a1ac7a5d72d716e50bc7b24445411171193520c18c4a74506b377222b5697
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe580981.TMP
Filesize89B
MD558ce8d12a71b4814b09e83482eac55d4
SHA1154bf091d14c1a37bfe749bc60f976b7c97bded8
SHA256def4c09571923b3c2d5b69d904922e3ebd0b0dc139967f2a84b59499085d74e9
SHA512848b2fccaea2d01e0dac20a9bc8939b0faa6cdde34026b9c100f1671a8b057e87266baabf3b5705eb866608ec5415f99acb4ec977e6d2db72bad0173dd78d2c9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145