Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2022, 13:42 UTC

General

  • Target

    072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe

  • Size

    2.5MB

  • MD5

    0894078d06d457b29171deb42134621e

  • SHA1

    b97d0073e813929c8d8d545231e63fa347b4f73b

  • SHA256

    072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af

  • SHA512

    e69bcb22530c5d091c9b3da03ace62cca664cf6969fc1fc1a1951ff5ede7811fa9778f9c83f5afe7843c703059b742f1b0c2e126f31201dbc4dd30462bb22d8b

  • SSDEEP

    49152:uo+NvMAiTRoQ8Hx6Xk6niMZxA/bKn32ZJuuG0O0wnXx7O7lrf29RVexbPIr3fD:uRpA8x6UpMZcbyM1G0wXxslq9RVUbgrb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe
    "C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront1.reg" || regedit.exe /s "C:\UVK\runfront1.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\system32\reg.exe
        reg.exe import "C:\UVK\runfront1.reg"
        3⤵
          PID:1116
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront2.reg" || regedit.exe /s "C:\UVK\runfront2.reg"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\system32\reg.exe
          reg.exe import "C:\UVK\runfront2.reg"
          3⤵
            PID:1392
        • C:\UVK\UVK_en64.exe
          "C:\UVK\UVK_en64.exe"
          2⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1728

      Network

      • flag-us
        DNS
        www.carifred.com
        UVK_en64.exe
        Remote address:
        8.8.8.8:53
        Request
        www.carifred.com
        IN A
        Response
        www.carifred.com
        IN CNAME
        carifred.com
        carifred.com
        IN A
        74.208.128.80
      • flag-us
        GET
        https://www.carifred.com/uvk/urls
        UVK_en64.exe
        Remote address:
        74.208.128.80:443
        Request
        GET /uvk/urls HTTP/1.1
        Referer: https://www.google.com
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
        Host: www.carifred.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Thu, 15 Sep 2022 13:42:59 GMT
        Content-Length: 2923
        Connection: keep-alive
        Last-Modified: Tue, 30 Aug 2022 19:35:27 GMT
        ETag: "b6b-5e77a7b7ed13d"
        Accept-Ranges: bytes
        X-Powered-By: PleskLin
      • 74.208.128.80:443
        https://www.carifred.com/uvk/urls
        tls, http
        UVK_en64.exe
        1.2kB
        10.8kB
        12
        18

        HTTP Request

        GET https://www.carifred.com/uvk/urls

        HTTP Response

        200
      • 8.8.8.8:53
        www.carifred.com
        dns
        UVK_en64.exe
        62 B
        92 B
        1
        1

        DNS Request

        www.carifred.com

        DNS Response

        74.208.128.80

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\UVK\UVK_en64.exe

        Filesize

        3.3MB

        MD5

        0365cc7d39ab91358e230a017971ed41

        SHA1

        6e255e79d96d07fdd78ac12b66faa340272b2fdb

        SHA256

        df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c

        SHA512

        dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e

      • C:\UVK\deflogo.png

        Filesize

        235KB

        MD5

        4105b6f89f726438d35b3fdf280beb6c

        SHA1

        820338bd894dae19013883aef0a6b8f0d53ef025

        SHA256

        80def2ec31ecf4ca333c02528e6fc966d52c3c9a045494ab66677d402c7c47e8

        SHA512

        e064d468897cf2eba7f7057d7775b67013474abf2f18aabf07096f02751a6fe841047c65932e9f61ab2c8c4960f9d67dc08320a7fb83713e95e6704284230e83

      • C:\UVK\runfront1.reg

        Filesize

        322B

        MD5

        c008d6ca1e246a8b60411bd92ec0ef12

        SHA1

        4ca3ca88bcd83fc4c595c2f69b98791dbf0ce9ab

        SHA256

        69b9bddedcdf01913cb81ac2294c5c5c3121f1155942068e2a467bc84eeef9ee

        SHA512

        39ef8a8a9244f7a3978ed6a61a0329f6a19ac94597ea407db227d413af11a153e83d545438f31c634e1f52e37ce8d0bfcb9007ebfd0d88b33e4ca35231bc69b0

      • C:\UVK\runfront2.reg

        Filesize

        3KB

        MD5

        35153c4ba2a33f128a43aeeafaed8010

        SHA1

        780c4156ed072212f0d0b253f6298471bc9334de

        SHA256

        bfc4517c4014fb0d67d08ad678e2959b4b12463f533caffaec652421a53111ee

        SHA512

        9329dabba14b531c0dd76849aa53389264deba138cf720b95b1646ffac13b9a5d3b640db1c0f1d9419fe22d7ac5a55ae8002e1af3ff9c38f84954f949442ee96

      • C:\UVK\uvkres.dll

        Filesize

        1.5MB

        MD5

        853cb5e4ec413cb58b6ae9f9ccb6fe7b

        SHA1

        ee6474c5a05991080fc43efd8d123266fce07dcb

        SHA256

        4c4bc02c7bec1a685ce77d337d0fe27b47ec1904f45ba60bb409a69720a56685

        SHA512

        7ed94a91085bfb6f9f774750c22a2357c3385c28f1b54f75419d4f610011d2efa92bcaa17422b59d3a31d7045c18d535afcb9cea9ab57c12dd7cf2c7fbb73e1c

      • \UVK\UVK_en64.exe

        Filesize

        3.3MB

        MD5

        0365cc7d39ab91358e230a017971ed41

        SHA1

        6e255e79d96d07fdd78ac12b66faa340272b2fdb

        SHA256

        df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c

        SHA512

        dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e

      • \UVK\UVK_en64.exe

        Filesize

        3.3MB

        MD5

        0365cc7d39ab91358e230a017971ed41

        SHA1

        6e255e79d96d07fdd78ac12b66faa340272b2fdb

        SHA256

        df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c

        SHA512

        dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e

      • memory/1976-54-0x000007FEFB531000-0x000007FEFB533000-memory.dmp

        Filesize

        8KB

      • memory/1976-55-0x0000000140000000-0x000000014005B000-memory.dmp

        Filesize

        364KB

      • memory/1976-69-0x0000000140000000-0x000000014005B000-memory.dmp

        Filesize

        364KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.