Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 20:43

General

  • Target

    SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe

  • Size

    2.7MB

  • MD5

    57b26b6613c95039e7a19bcd3e7d3ef8

  • SHA1

    efbb3308d22ede9570bb45d6e3d1c904f4f49ede

  • SHA256

    b9e30fe4109eb580d7ee90c45e093fb58358bf57403f7abafb31188210e3e502

  • SHA512

    73f4ab9a310fd9aaab8120c05935f28e9b21a37fd7280feb7305c1d946e09eea230c31df48fe87c375dd846b633f0996a651a97179b41922151fc5d65d0e3506

  • SSDEEP

    49152:acbz6nBGx0OdomSyHdkxkXpjd9rfS81AyFTREuX86GfZXzAVE+:acbYBGxbdo6uG1S81dFTRBshZ0E+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
            5⤵
            • Loads dropped DLL
            PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • \Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • memory/1724-8-0x0000000002510000-0x0000000002799000-memory.dmp

    Filesize

    2.5MB

  • memory/1724-16-0x0000000001F10000-0x0000000001FF5000-memory.dmp

    Filesize

    916KB

  • memory/1724-17-0x0000000001F10000-0x0000000001FF5000-memory.dmp

    Filesize

    916KB

  • memory/1724-13-0x0000000001F10000-0x0000000001FF5000-memory.dmp

    Filesize

    916KB

  • memory/1724-12-0x00000000004F0000-0x00000000005ED000-memory.dmp

    Filesize

    1012KB

  • memory/1724-10-0x0000000002510000-0x0000000002799000-memory.dmp

    Filesize

    2.5MB

  • memory/1724-9-0x00000000000E0000-0x00000000000E6000-memory.dmp

    Filesize

    24KB

  • memory/2204-22-0x0000000002280000-0x0000000002509000-memory.dmp

    Filesize

    2.5MB

  • memory/2204-23-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/2204-24-0x0000000002280000-0x0000000002509000-memory.dmp

    Filesize

    2.5MB

  • memory/2204-26-0x0000000002780000-0x000000000287D000-memory.dmp

    Filesize

    1012KB

  • memory/2204-27-0x0000000002880000-0x0000000002965000-memory.dmp

    Filesize

    916KB

  • memory/2204-30-0x0000000002880000-0x0000000002965000-memory.dmp

    Filesize

    916KB

  • memory/2204-31-0x0000000002880000-0x0000000002965000-memory.dmp

    Filesize

    916KB