Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
31/10/2023, 07:12 UTC
231031-h1xr9shb9w 631/10/2023, 07:09 UTC
231031-hy68xsbc69 631/10/2023, 07:01 UTC
231031-htdqtabc49 6Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2023, 07:09 UTC
Static task
static1
Behavioral task
behavioral1
Sample
HideUL/HideUL.exe
Resource
win10-20231020-en
General
-
Target
HideUL/HideUL.exe
-
Size
779KB
-
MD5
59e6919b61bcef4225d571e10fb13ef2
-
SHA1
c864cb1e389c51bdea6cecfed47162e6a03f1e22
-
SHA256
65ceb24e66bdac7453863bf268316bf6b6b17070ae1100713027c0be398e61f6
-
SHA512
c904007bd0989c6be41ce1afbbf05fa72d4f81a8b5a4e81e0fda11030e772d6a33c21fad0fe4e1faf97ec0611427a8c7aa6366d5920714e835ba80444f76d89c
-
SSDEEP
12288:daWzgMg7v3qnCiMErQohh0F4TCJ8lnyJQY4ZNGdiXJpp05iwQK:8aHMv6C4rjXnyJQRZYiA5kK
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol HideUL.exe File created C:\Windows\System32\GroupPolicy\User\Registry.pol HideUL.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini HideUL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs regedit.exe 1 IoCs
pid Process 4248 regedit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3708 HideUL.exe 3708 HideUL.exe 3708 HideUL.exe 3708 HideUL.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3708 HideUL.exe 4248 regedit.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\SettingsPageVisibility = "hide:appsfeatures;" HideUL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer HideUL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HideUL\HideUL.exe"C:\Users\Admin\AppData\Local\Temp\HideUL\HideUL.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:3708
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4344
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3664
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:4540
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:4248