Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe
Resource
win10v2004-20221111-en
General
-
Target
e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe
-
Size
127KB
-
MD5
7c1e2008ab6d06e9a2884e816c4cce06
-
SHA1
24f8bd3bcf6d86933e48d03c29c71c5ee0c80a34
-
SHA256
e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636
-
SHA512
7d130f436c42968a818e2673b2dc9a24acdb858d933b722696ed9b79add19559d8b6994cf226f1741da251e1cb0427de9b9bc9cca8cc34e388fdac29926491df
-
SSDEEP
3072:Kpga6wBiZjyxz70zURg3tSiZPNe5sXhpMnd8KEc2JN:KpgmBi8F04mDeCwC
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\Uco.Dll" e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe -
Deletes itself 1 IoCs
pid Process 896 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Uco.Dll e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe File opened for modification C:\Windows\SysWOW64\Uco.Dll e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe -
Kills process with taskkill 1 IoCs
pid Process 1240 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 696 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe Token: SeDebugPrivilege 1240 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1240 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 28 PID 1132 wrote to memory of 1240 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 28 PID 1132 wrote to memory of 1240 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 28 PID 1132 wrote to memory of 1240 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 28 PID 1132 wrote to memory of 896 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 32 PID 1132 wrote to memory of 896 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 32 PID 1132 wrote to memory of 896 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 32 PID 1132 wrote to memory of 896 1132 e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe 32 PID 896 wrote to memory of 696 896 cmd.exe 34 PID 896 wrote to memory of 696 896 cmd.exe 34 PID 896 wrote to memory of 696 896 cmd.exe 34 PID 896 wrote to memory of 696 896 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe"C:\Users\Admin\AppData\Local\Temp\e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 360tray.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping localhost -n 1 && del "C:\Users\Admin\AppData\Local\Temp\e12ad27e8ff9e6dc9154f1848350d2fa03c9f3c0b3509af18ef3e21176516636.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 13⤵
- Runs ping.exe
PID:696
-
-