Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 20:43

General

  • Target

    SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe

  • Size

    2.7MB

  • MD5

    57b26b6613c95039e7a19bcd3e7d3ef8

  • SHA1

    efbb3308d22ede9570bb45d6e3d1c904f4f49ede

  • SHA256

    b9e30fe4109eb580d7ee90c45e093fb58358bf57403f7abafb31188210e3e502

  • SHA512

    73f4ab9a310fd9aaab8120c05935f28e9b21a37fd7280feb7305c1d946e09eea230c31df48fe87c375dd846b633f0996a651a97179b41922151fc5d65d0e3506

  • SSDEEP

    49152:acbz6nBGx0OdomSyHdkxkXpjd9rfS81AyFTREuX86GfZXzAVE+:acbYBGxbdo6uG1S81dFTRBshZ0E+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Uztuby.4.20089.11893.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl",
            5⤵
            • Loads dropped DLL
            PID:404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WN9GW71a.Cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • C:\Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • C:\Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • C:\Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • C:\Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • C:\Users\Admin\AppData\Local\Temp\Wn9GW71a.cpl

    Filesize

    2.5MB

    MD5

    4b085e0d9d9c8eeda85439c8f3789d23

    SHA1

    df38031d504daa9192b082128e92799759e1e720

    SHA256

    08ce4023cd71aa2cf24254486283d419147a6c642e995878ce623ada4408d4f5

    SHA512

    20e5bcf1d897ba521e6facada73f84445b8be44b52baad982dccbeab46901363092bfe3af5ed61db83a6afa5477f06dc6677d3aeb9ec0505acbd7f219d7c0bfd

  • memory/404-32-0x0000000003310000-0x00000000033F5000-memory.dmp

    Filesize

    916KB

  • memory/404-29-0x0000000003310000-0x00000000033F5000-memory.dmp

    Filesize

    916KB

  • memory/404-28-0x0000000003200000-0x00000000032FD000-memory.dmp

    Filesize

    1012KB

  • memory/404-25-0x0000000002BB0000-0x0000000002E39000-memory.dmp

    Filesize

    2.5MB

  • memory/404-26-0x00000000030C0000-0x00000000030C6000-memory.dmp

    Filesize

    24KB

  • memory/404-24-0x0000000002BB0000-0x0000000002E39000-memory.dmp

    Filesize

    2.5MB

  • memory/404-33-0x0000000003310000-0x00000000033F5000-memory.dmp

    Filesize

    916KB

  • memory/1484-13-0x0000000002D80000-0x0000000002D86000-memory.dmp

    Filesize

    24KB

  • memory/1484-21-0x00000000039B0000-0x0000000003A95000-memory.dmp

    Filesize

    916KB

  • memory/1484-20-0x00000000039B0000-0x0000000003A95000-memory.dmp

    Filesize

    916KB

  • memory/1484-17-0x00000000039B0000-0x0000000003A95000-memory.dmp

    Filesize

    916KB

  • memory/1484-16-0x00000000038B0000-0x00000000039AD000-memory.dmp

    Filesize

    1012KB

  • memory/1484-14-0x0000000003280000-0x0000000003509000-memory.dmp

    Filesize

    2.5MB

  • memory/1484-12-0x0000000003280000-0x0000000003509000-memory.dmp

    Filesize

    2.5MB