Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10/04/2024, 09:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wuit.modelcommission.top/hdoobobglower01?affsub2=fut
Resource
win10v2004-20240226-es
General
-
Target
http://wuit.modelcommission.top/hdoobobglower01?affsub2=fut
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 2200 msedge.exe 2200 msedge.exe 2184 identity_helper.exe 2184 identity_helper.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3856 2200 msedge.exe 86 PID 2200 wrote to memory of 3856 2200 msedge.exe 86 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 948 2200 msedge.exe 87 PID 2200 wrote to memory of 2704 2200 msedge.exe 88 PID 2200 wrote to memory of 2704 2200 msedge.exe 88 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89 PID 2200 wrote to memory of 5036 2200 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://wuit.modelcommission.top/hdoobobglower01?affsub2=fut1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff37c946f8,0x7fff37c94708,0x7fff37c947182⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5825124580751895232,2752342250196762404,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
6KB
MD5815ca6e3420b13ca909ceab648122b50
SHA1a80c368797e73d877ec4f4a9c76587f30b0590fa
SHA256d331644fb8cddc0f9cbe1f967af38485eb299bf6a2cc21b4013b6e9626a0784f
SHA512d1f8bae55e0856fb7416fdc9de21286886b0d6227c401e70eee9f712f15bc8706f60f9eff064b722f86bb076ad6e6542151bf4ee05856c130ca6934c5c090224
-
Filesize
6KB
MD557b0a62b200ec2c0813255c54f4653ba
SHA136cf1ef049057de675aa5a10f1c3b86bae6dfb9a
SHA25637745a69980d8d935ee0765a32e01e757baf04b257018ed94e4af37587a67eac
SHA512bf3a72c41f447bee125c24b8ea61dc54a55bdb458f7ee4774c92f3f42081fca8ea8b8ef77582527177b0cca615cb2c36f12735551526dad2c3d7a6f01d261c60
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD505e45ce2d4dd2b2e60c1bec2118bb4d3
SHA1f5aa7dc1af94ff78b353e323b238c8623e304363
SHA256b020d0b3aaaa219e52b3cc780ba3faa3631a7cef4614987c89c64bf88de436f3
SHA512d29a546db4aa4a1c56abf27d6db1782bfaeb7b9325e1e736b668a351eded62ded90cbddb3efa941a5b0011a5e25f739ac2e349467a0963cfdc3acb92ed672885