Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    65s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2022, 13:42

General

  • Target

    072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe

  • Size

    2.5MB

  • MD5

    0894078d06d457b29171deb42134621e

  • SHA1

    b97d0073e813929c8d8d545231e63fa347b4f73b

  • SHA256

    072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af

  • SHA512

    e69bcb22530c5d091c9b3da03ace62cca664cf6969fc1fc1a1951ff5ede7811fa9778f9c83f5afe7843c703059b742f1b0c2e126f31201dbc4dd30462bb22d8b

  • SSDEEP

    49152:uo+NvMAiTRoQ8Hx6Xk6niMZxA/bKn32ZJuuG0O0wnXx7O7lrf29RVexbPIr3fD:uRpA8x6UpMZcbyM1G0wXxslq9RVUbgrb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe
    "C:\Users\Admin\AppData\Local\Temp\072087ec3b8be885fd82335ca0f6a831003679763eb3fd472fab01deb510f0af.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront1.reg" || regedit.exe /s "C:\UVK\runfront1.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4960
      • C:\Windows\system32\reg.exe
        reg.exe import "C:\UVK\runfront1.reg"
        3⤵
          PID:5108
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg.exe import "C:\UVK\runfront2.reg" || regedit.exe /s "C:\UVK\runfront2.reg"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3084
        • C:\Windows\system32\reg.exe
          reg.exe import "C:\UVK\runfront2.reg"
          3⤵
            PID:4356
        • C:\UVK\UVK_en64.exe
          "C:\UVK\UVK_en64.exe"
          2⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1208

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\UVK\UVK_en64.exe

        Filesize

        3.3MB

        MD5

        0365cc7d39ab91358e230a017971ed41

        SHA1

        6e255e79d96d07fdd78ac12b66faa340272b2fdb

        SHA256

        df57b733a33abcf7c2d2bdd44fcdd75257c85cf381589c383c6363e74594375c

        SHA512

        dc7ff9a2e9cba05ab04f1afdbf1361bf321550720ed5aa892d27bb8e32e64128d396276a00ffa2db717cb531ea54d02321e2cdba7f0c9061f8f485f53061cc4e

      • C:\UVK\deflogo.png

        Filesize

        235KB

        MD5

        4105b6f89f726438d35b3fdf280beb6c

        SHA1

        820338bd894dae19013883aef0a6b8f0d53ef025

        SHA256

        80def2ec31ecf4ca333c02528e6fc966d52c3c9a045494ab66677d402c7c47e8

        SHA512

        e064d468897cf2eba7f7057d7775b67013474abf2f18aabf07096f02751a6fe841047c65932e9f61ab2c8c4960f9d67dc08320a7fb83713e95e6704284230e83

      • C:\UVK\runfront1.reg

        Filesize

        322B

        MD5

        c008d6ca1e246a8b60411bd92ec0ef12

        SHA1

        4ca3ca88bcd83fc4c595c2f69b98791dbf0ce9ab

        SHA256

        69b9bddedcdf01913cb81ac2294c5c5c3121f1155942068e2a467bc84eeef9ee

        SHA512

        39ef8a8a9244f7a3978ed6a61a0329f6a19ac94597ea407db227d413af11a153e83d545438f31c634e1f52e37ce8d0bfcb9007ebfd0d88b33e4ca35231bc69b0

      • C:\UVK\runfront2.reg

        Filesize

        3KB

        MD5

        35153c4ba2a33f128a43aeeafaed8010

        SHA1

        780c4156ed072212f0d0b253f6298471bc9334de

        SHA256

        bfc4517c4014fb0d67d08ad678e2959b4b12463f533caffaec652421a53111ee

        SHA512

        9329dabba14b531c0dd76849aa53389264deba138cf720b95b1646ffac13b9a5d3b640db1c0f1d9419fe22d7ac5a55ae8002e1af3ff9c38f84954f949442ee96

      • C:\UVK\uvkres.dll

        Filesize

        1.5MB

        MD5

        853cb5e4ec413cb58b6ae9f9ccb6fe7b

        SHA1

        ee6474c5a05991080fc43efd8d123266fce07dcb

        SHA256

        4c4bc02c7bec1a685ce77d337d0fe27b47ec1904f45ba60bb409a69720a56685

        SHA512

        7ed94a91085bfb6f9f774750c22a2357c3385c28f1b54f75419d4f610011d2efa92bcaa17422b59d3a31d7045c18d535afcb9cea9ab57c12dd7cf2c7fbb73e1c

      • memory/4728-132-0x0000000140000000-0x000000014005B000-memory.dmp

        Filesize

        364KB

      • memory/4728-143-0x0000000140000000-0x000000014005B000-memory.dmp

        Filesize

        364KB