Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:48
Behavioral task
behavioral1
Sample
0a9ef043882edacc8f30bd13977a465c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a9ef043882edacc8f30bd13977a465c.exe
Resource
win10v2004-20231215-en
General
-
Target
0a9ef043882edacc8f30bd13977a465c.exe
-
Size
220KB
-
MD5
0a9ef043882edacc8f30bd13977a465c
-
SHA1
32eef93493a50b75dae3e0e36d3bf86779ff4c44
-
SHA256
1c562e93c15bd6c05849276b1f31e38405246dd40e7ae44325523337e4f6f027
-
SHA512
43a914db8af2928b1695760af7911a388193f9e6e3cf41743a75002d12c4a37cf81c5f2525466786731832c26a1703690ca12c8c31816c2dd7fdb6465462dcdb
-
SSDEEP
6144:R7rWjayYoWv7fGkZWa+emUT6+VMSmoZI:RGvYbTnWa+0ThxM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 944 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 uxbou.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 0a9ef043882edacc8f30bd13977a465c.exe 2332 0a9ef043882edacc8f30bd13977a465c.exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x0000000000817000-memory.dmp upx behavioral1/files/0x000e0000000122e4-5.dat upx behavioral1/memory/2332-11-0x0000000007880000-0x0000000007C97000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6CF0A0C8-CEE0-AD4E-46DF-EAE75CAEC9FA} = "C:\\Users\\Admin\\AppData\\Roaming\\Oxut\\uxbou.exe" uxbou.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 0a9ef043882edacc8f30bd13977a465c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0a9ef043882edacc8f30bd13977a465c.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe 2412 uxbou.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2332 0a9ef043882edacc8f30bd13977a465c.exe Token: SeSecurityPrivilege 2332 0a9ef043882edacc8f30bd13977a465c.exe Token: SeSecurityPrivilege 2332 0a9ef043882edacc8f30bd13977a465c.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2412 2332 0a9ef043882edacc8f30bd13977a465c.exe 28 PID 2332 wrote to memory of 2412 2332 0a9ef043882edacc8f30bd13977a465c.exe 28 PID 2332 wrote to memory of 2412 2332 0a9ef043882edacc8f30bd13977a465c.exe 28 PID 2332 wrote to memory of 2412 2332 0a9ef043882edacc8f30bd13977a465c.exe 28 PID 2412 wrote to memory of 1108 2412 uxbou.exe 12 PID 2412 wrote to memory of 1108 2412 uxbou.exe 12 PID 2412 wrote to memory of 1108 2412 uxbou.exe 12 PID 2412 wrote to memory of 1108 2412 uxbou.exe 12 PID 2412 wrote to memory of 1108 2412 uxbou.exe 12 PID 2412 wrote to memory of 1172 2412 uxbou.exe 15 PID 2412 wrote to memory of 1172 2412 uxbou.exe 15 PID 2412 wrote to memory of 1172 2412 uxbou.exe 15 PID 2412 wrote to memory of 1172 2412 uxbou.exe 15 PID 2412 wrote to memory of 1172 2412 uxbou.exe 15 PID 2412 wrote to memory of 1196 2412 uxbou.exe 13 PID 2412 wrote to memory of 1196 2412 uxbou.exe 13 PID 2412 wrote to memory of 1196 2412 uxbou.exe 13 PID 2412 wrote to memory of 1196 2412 uxbou.exe 13 PID 2412 wrote to memory of 1196 2412 uxbou.exe 13 PID 2412 wrote to memory of 612 2412 uxbou.exe 18 PID 2412 wrote to memory of 612 2412 uxbou.exe 18 PID 2412 wrote to memory of 612 2412 uxbou.exe 18 PID 2412 wrote to memory of 612 2412 uxbou.exe 18 PID 2412 wrote to memory of 612 2412 uxbou.exe 18 PID 2412 wrote to memory of 2332 2412 uxbou.exe 27 PID 2412 wrote to memory of 2332 2412 uxbou.exe 27 PID 2412 wrote to memory of 2332 2412 uxbou.exe 27 PID 2412 wrote to memory of 2332 2412 uxbou.exe 27 PID 2412 wrote to memory of 2332 2412 uxbou.exe 27 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29 PID 2332 wrote to memory of 944 2332 0a9ef043882edacc8f30bd13977a465c.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\0a9ef043882edacc8f30bd13977a465c.exe"C:\Users\Admin\AppData\Local\Temp\0a9ef043882edacc8f30bd13977a465c.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\Oxut\uxbou.exe"C:\Users\Admin\AppData\Roaming\Oxut\uxbou.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpaeedfe72.bat"3⤵
- Deletes itself
PID:944
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5c1c38b5584e11213db9d03db9ef3de95
SHA1bfc31145a74cfa60086635b651d745aeeb565540
SHA2565dc449c311fb889cd336a8ba61c5d96dbb56cf4f085f90ad8637afcf8d7dd94d
SHA5127aab59fd5b7b6e13071f33be1bfa78259f77eea82510f2a5b19d771504d4533cf284b339856de11a3f3d21eb10d02ec3dd4d959c419267480846e321e7ee5518
-
Filesize
366B
MD5df91242c36530436950f212a330b2d96
SHA19ad15eb3fe8edd833d0c33499f629777db357a93
SHA2563a8ef5402d07cf8b27ea488c45c3cdc8d011660952162ce714c6c37a892c357a
SHA512e1000ede757b72f0cad14652c227b4a62569688263328eecb5645ecb19c5d592ac3ba5f182991d3ad7e9e2fdd8d6cfe2d45a838161aa213ac75fb15fee3b7cb9
-
Filesize
220KB
MD5977d20733718c22404582add964b0fff
SHA1c3512ed89dec46406cee8334da5dcf5019513189
SHA2562db536365dc2a2d2d8de20726357b000a0c9f5392ad286972734677a4b4d092e
SHA5120ea315c2388395510afa3aa7e32dbbefaadd114c2ef7fb9a9a1da7a2ace3281cbfdfde631045829f13ba11f0c3567a607593f7761bf54b7addafe1390b62a994