Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
26-08-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
-
Size
2.7MB
-
MD5
57b26b6613c95039e7a19bcd3e7d3ef8
-
SHA1
efbb3308d22ede9570bb45d6e3d1c904f4f49ede
-
SHA256
b9e30fe4109eb580d7ee90c45e093fb58358bf57403f7abafb31188210e3e502
-
SHA512
73f4ab9a310fd9aaab8120c05935f28e9b21a37fd7280feb7305c1d946e09eea230c31df48fe87c375dd846b633f0996a651a97179b41922151fc5d65d0e3506
-
SSDEEP
49152:acbz6nBGx0OdomSyHdkxkXpjd9rfS81AyFTREuX86GfZXzAVE+:acbYBGxbdo6uG1S81dFTRBshZ0E+
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 2204 rundll32.exe 2204 rundll32.exe 2204 rundll32.exe 2204 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2084 wrote to memory of 792 2084 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 30 PID 2084 wrote to memory of 792 2084 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 30 PID 2084 wrote to memory of 792 2084 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 30 PID 2084 wrote to memory of 792 2084 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 30 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 792 wrote to memory of 1724 792 control.exe 31 PID 1724 wrote to memory of 2188 1724 rundll32.exe 32 PID 1724 wrote to memory of 2188 1724 rundll32.exe 32 PID 1724 wrote to memory of 2188 1724 rundll32.exe 32 PID 1724 wrote to memory of 2188 1724 rundll32.exe 32 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33 PID 2188 wrote to memory of 2204 2188 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",5⤵
- Loads dropped DLL
PID:2204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd