Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
-
Size
2.7MB
-
MD5
57b26b6613c95039e7a19bcd3e7d3ef8
-
SHA1
efbb3308d22ede9570bb45d6e3d1c904f4f49ede
-
SHA256
b9e30fe4109eb580d7ee90c45e093fb58358bf57403f7abafb31188210e3e502
-
SHA512
73f4ab9a310fd9aaab8120c05935f28e9b21a37fd7280feb7305c1d946e09eea230c31df48fe87c375dd846b633f0996a651a97179b41922151fc5d65d0e3506
-
SSDEEP
49152:acbz6nBGx0OdomSyHdkxkXpjd9rfS81AyFTREuX86GfZXzAVE+:acbYBGxbdo6uG1S81dFTRBshZ0E+
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1484 rundll32.exe 1484 rundll32.exe 404 rundll32.exe 404 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2292 wrote to memory of 3980 2292 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 82 PID 2292 wrote to memory of 3980 2292 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 82 PID 2292 wrote to memory of 3980 2292 SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe 82 PID 3980 wrote to memory of 1484 3980 control.exe 85 PID 3980 wrote to memory of 1484 3980 control.exe 85 PID 3980 wrote to memory of 1484 3980 control.exe 85 PID 1484 wrote to memory of 1496 1484 rundll32.exe 87 PID 1484 wrote to memory of 1496 1484 rundll32.exe 87 PID 1496 wrote to memory of 404 1496 RunDll32.exe 89 PID 1496 wrote to memory of 404 1496 RunDll32.exe 89 PID 1496 wrote to memory of 404 1496 RunDll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",5⤵
- Loads dropped DLL
PID:404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd
-
Filesize
2.5MB
MD54b085e0d9d9c8eeda85439c8f3789d23
SHA1df38031d504daa9192b082128e92799759e1e720
SHA25608ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5
SHA51220e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd