Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 15:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.freebobux.com
Resource
win10v2004-20240802-en
General
-
Target
https://www.freebobux.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 756 msedge.exe 756 msedge.exe 1932 msedge.exe 1932 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2604 1932 msedge.exe 82 PID 1932 wrote to memory of 2604 1932 msedge.exe 82 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 3448 1932 msedge.exe 83 PID 1932 wrote to memory of 756 1932 msedge.exe 84 PID 1932 wrote to memory of 756 1932 msedge.exe 84 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85 PID 1932 wrote to memory of 4892 1932 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.freebobux.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9148381929612752251,18059835838526481681,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD556a7bd93fafd5bcf34596eec44704565
SHA11400f752f21efffc8359592ec3c20ae7e67e4d37
SHA25697c443b6afc490c90d82f86e2c9ebe64e23ba8b3fd525dd4be1f5035c0c72d27
SHA512016eabbfdcb4daeac8f3aa8e91c51e1a02d32fd6177f5c9fab207255ef7c20564af5a50b003a7b08f32837ab19447f217735ed7e8ebb9389fc3c08b2e89657cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD54c2065c144f70c68fd70dd2aaee84bfb
SHA106c08c91ab880ff168812e1656a0a821a5679f8f
SHA256f8aba3df21dd0783dc1347fe8b6aff11f80a66693a8b07b477c00f5f50a1dbe8
SHA5127a1be1795c898ad029157a126155f4f4d0f1be8c13385b9c7e7daddb610a204570bb03ebdf482b3b26e89382745302e41e6a6fb097ad1c8b0a1957696782d9d0
-
Filesize
1KB
MD5a178ee2599b8d37bbe8e3df4014a6bc3
SHA14be2a377a1c8da810488f9011db3021d245375c6
SHA2563791ec22cb2f52e3e232991cfef62bec6bda84c2362065ae2ed8e88384c19375
SHA512cc4dc06ec4b8bce1b4aabd4f02df736ff6726332a6ce31c6f201093e6928302703efd908249af8c2edfeea22a4d9e559be61bb2ed20dc0f19381fae1a61d27fc
-
Filesize
1KB
MD59df5625854f778984b33100c53476a22
SHA1f8828adf1ddc1ed6a61c21ba00ce8f30938ed492
SHA256069a934901f4e977aec3455c63a0464f59a86c4f414ec88a65b450d8db934e8f
SHA512bc78b941cfb60d77c94a47ea524bc776b15c5d683c0cb5d178d12ece5d48f0fdbc6e2d8c6850fd3eda1f3a5a04a3f4ef7c97a81de6708bc34623c3de271fef85
-
Filesize
5KB
MD53c3e00cab82adef81672c28086c9bb63
SHA1a9cb243480eb80b01890e0e662211c93c3cfcd5f
SHA2563d62305b38a260891a1895cf993dbf37588a40a62eb7d9549ad32f97f104c272
SHA5126b349a9ccc03aa519c869cbd97eb42da3a8253011a3fa0d8daf4c8db4da2b54452da8caaa1801dd4c5d16e50e1d2110949b7c99f1f403bcc95fcc5fcd9c39999
-
Filesize
7KB
MD54a55ae8477f3bb8964774ea48368df85
SHA1b0af6d864655a2d8ca4a26109c396a0bce5d63e6
SHA256e3aa6e9408831de95d08fdf3055f8b4d8f32995d6e28080e5c77d74936484110
SHA512ee831d9a66c866079d5db267c0a2f615cd9be1d0dc1a2c85bcda27d0f64e4c35413e9cbd4f42d8535e227516d5948dbc4509989b5346208af0b60b559d34c8ae
-
Filesize
7KB
MD59f6b5311c34f27368e52ca868d39f40f
SHA170f34c108aed1783f11586a447ba19ce179106f6
SHA25634b2a952bf08feff7315044e9714fb28fc0a5ceccdaf9e55a9d98a37b52c354e
SHA512d2730d1783c9c15a2d3264bee4e723298fe019ab69e36e47225201733bbd191fdd1db3e07e66bbda83be657cbcc3a377a3352b77e00d73d4c78c8c8e94f672c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50614878ad3448a852f31b03d8d28146c
SHA1b365ab9e2140796b4d2f4aee252ab739a19a6f34
SHA2564cffe3b0464afa006a6398a3215fc2017aadc73225478ed9ab9a949bad544273
SHA512a1c1db37e64855374e90ed77a1f6e96784d5b8b9d67ce81a8b58f26411986082ea8a3257ce3c6751f496f5b63346179062586c072e83c762f1139b096d5e1175