Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/09/2022, 13:42 UTC
Behavioral task
behavioral1
Sample
072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe
Resource
win10v2004-20220812-en
General
-
Target
072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe
-
Size
2.5MB
-
MD5
0894078d06d457b29171deb42134621e
-
SHA1
b97d0073e813929c8d8d545231e63fa347b4f73b
-
SHA256
072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af
-
SHA512
e69bcb22530c5d091c9b3da03ace62cca664cf6969fc1fc1a1951ff5ede7811fa9778f9c83f5afe7843c703059b742f1b0c2e126f31201dbc4dd30462bb22d8b
-
SSDEEP
49152:uo+NvMAiTRoQ8Hx6Xk6niMZxA/bKn32ZJuuG0O0wnXx7O7lrf29RVexbPIr3fD:uRpA8x6UpMZcbyM1G0wXxslq9RVUbgrb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1728 UVK_en64.exe -
resource yara_rule behavioral1/memory/1976-55-0x0000000140000000-0x000000014005B000-memory.dmp upx behavioral1/memory/1976-69-0x0000000140000000-0x000000014005B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 1284 Process not Found -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 UVK_en64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 UVK_en64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e UVK_en64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 UVK_en64.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: 33 1728 UVK_en64.exe Token: SeIncBasePriorityPrivilege 1728 UVK_en64.exe Token: SeRestorePrivilege 1728 UVK_en64.exe Token: SeTakeOwnershipPrivilege 1728 UVK_en64.exe Token: SeDebugPrivilege 1728 UVK_en64.exe Token: SeSecurityPrivilege 1728 UVK_en64.exe Token: SeBackupPrivilege 1728 UVK_en64.exe Token: SeImpersonatePrivilege 1728 UVK_en64.exe Token: SeSystemProfilePrivilege 1728 UVK_en64.exe Token: SeAssignPrimaryTokenPrivilege 1728 UVK_en64.exe Token: 31 1728 UVK_en64.exe Token: SeTcbPrivilege 1728 UVK_en64.exe Token: SeIncreaseQuotaPrivilege 1728 UVK_en64.exe Token: SeShutdownPrivilege 1728 UVK_en64.exe Token: SeRestorePrivilege 1728 UVK_en64.exe Token: SeTakeOwnershipPrivilege 1728 UVK_en64.exe Token: SeDebugPrivilege 1728 UVK_en64.exe Token: SeSecurityPrivilege 1728 UVK_en64.exe Token: SeBackupPrivilege 1728 UVK_en64.exe Token: SeImpersonatePrivilege 1728 UVK_en64.exe Token: SeSystemProfilePrivilege 1728 UVK_en64.exe Token: SeAssignPrimaryTokenPrivilege 1728 UVK_en64.exe Token: 31 1728 UVK_en64.exe Token: SeTcbPrivilege 1728 UVK_en64.exe Token: SeIncreaseQuotaPrivilege 1728 UVK_en64.exe Token: SeShutdownPrivilege 1728 UVK_en64.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 1728 UVK_en64.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1096 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 26 PID 1976 wrote to memory of 1096 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 26 PID 1976 wrote to memory of 1096 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 26 PID 1096 wrote to memory of 1116 1096 cmd.exe 28 PID 1096 wrote to memory of 1116 1096 cmd.exe 28 PID 1096 wrote to memory of 1116 1096 cmd.exe 28 PID 1976 wrote to memory of 1488 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 29 PID 1976 wrote to memory of 1488 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 29 PID 1976 wrote to memory of 1488 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 29 PID 1488 wrote to memory of 1392 1488 cmd.exe 31 PID 1488 wrote to memory of 1392 1488 cmd.exe 31 PID 1488 wrote to memory of 1392 1488 cmd.exe 31 PID 1976 wrote to memory of 1728 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 32 PID 1976 wrote to memory of 1728 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 32 PID 1976 wrote to memory of 1728 1976 072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe"C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront1.reg" || regedit.exe /s "C:\UVK\runfront1.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\reg.exereg.exe import "C:\UVK\runfront1.reg"3⤵PID:1116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront2.reg" || regedit.exe /s "C:\UVK\runfront2.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\reg.exereg.exe import "C:\UVK\runfront2.reg"3⤵PID:1392
-
-
-
C:\UVK\UVK_en64.exe"C:\UVK\UVK_en64.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1728
-
Network
-
Remote address:8.8.8.8:53Requestwww.carifred.comIN AResponsewww.carifred.comIN CNAMEcarifred.comcarifred.comIN A74.208.128.80
-
Remote address:74.208.128.80:443RequestGET /uvk/urls HTTP/1.1
Referer: https://www.google.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Host: www.carifred.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Thu, 15 Sep 2022 13:42:59 GMT
Content-Length: 2923
Connection: keep-alive
Last-Modified: Tue, 30 Aug 2022 19:35:27 GMT
ETag: "b6b-5e77a7b7ed13d"
Accept-Ranges: bytes
X-Powered-By: PleskLin
-
1.2kB 10.8kB 12 18
HTTP Request
GET https://www.carifred.com/uvk/urlsHTTP Response
200
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD50365cc7d39ab91358e230a017971ed41
SHA16e255e79d96d07fdd78ac12b66faa340272b2fdb
SHA256df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c
SHA512dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e
-
Filesize
235KB
MD54105b6f89f726438d35b3fdf280beb6c
SHA1820338bd894dae19013883aef0a6b8f0d53ef025
SHA25680def2ec31ecf4ca333c02528e6fc966d52c3c9a045494ab66677d402c7c47e8
SHA512e064d468897cf2eba7f7057d7775b67013474abf2f18aabf07096f02751a6fe841047c65932e9f61ab2c8c4960f9d67dc08320a7fb83713e95e6704284230e83
-
Filesize
322B
MD5c008d6ca1e246a8b60411bd92ec0ef12
SHA14ca3ca88bcd83fc4c595c2f69b98791dbf0ce9ab
SHA25669b9bddedcdf01913cb81ac2294c5c5c3121f1155942068e2a467bc84eeef9ee
SHA51239ef8a8a9244f7a3978ed6a61a0329f6a19ac94597ea407db227d413af11a153e83d545438f31c634e1f52e37ce8d0bfcb9007ebfd0d88b33e4ca35231bc69b0
-
Filesize
3KB
MD535153c4ba2a33f128a43aeeafaed8010
SHA1780c4156ed072212f0d0b253f6298471bc9334de
SHA256bfc4517c4014fb0d67d08ad678e2959b4b12463f533caffaec652421a53111ee
SHA5129329dabba14b531c0dd76849aa53389264deba138cf720b95b1646ffac13b9a5d3b640db1c0f1d9419fe22d7ac5a55ae8002e1af3ff9c38f84954f949442ee96
-
Filesize
1.5MB
MD5853cb5e4ec413cb58b6ae9f9ccb6fe7b
SHA1ee6474c5a05991080fc43efd8d123266fce07dcb
SHA2564c4bc02c7bec1a685ce77d337d0fe27b47ec1904f45ba60bb409a69720a56685
SHA5127ed94a91085bfb6f9f774750c22a2357c3385c28f1b54f75419d4f610011d2efa92bcaa17422b59d3a31d7045c18d535afcb9cea9ab57c12dd7cf2c7fbb73e1c
-
Filesize
3.3MB
MD50365cc7d39ab91358e230a017971ed41
SHA16e255e79d96d07fdd78ac12b66faa340272b2fdb
SHA256df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c
SHA512dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e
-
Filesize
3.3MB
MD50365cc7d39ab91358e230a017971ed41
SHA16e255e79d96d07fdd78ac12b66faa340272b2fdb
SHA256df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c
SHA512dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e