Overview
overview
3Static
static
1UwU.zip
windows7-x64
1UwU.zip
windows10-2004-x64
1UwU.zip
windows7-x64
1UwU.zip
windows10-2004-x64
1UwU/data.pkl
windows7-x64
3UwU/data.pkl
windows10-2004-x64
3UwU/data/0
windows7-x64
1UwU/data/0
windows10-2004-x64
1UwU/data/1
windows7-x64
1UwU/data/1
windows10-2004-x64
1UwU/data/10
windows7-x64
1UwU/data/10
windows10-2004-x64
1UwU/data/100
windows7-x64
1UwU/data/100
windows10-2004-x64
1UwU/data/101
windows7-x64
1UwU/data/101
windows10-2004-x64
1UwU/data/102
windows7-x64
1UwU/data/102
windows10-2004-x64
1UwU/data/103
windows7-x64
1UwU/data/103
windows10-2004-x64
1UwU/data/104
windows7-x64
1UwU/data/104
windows10-2004-x64
1UwU/data/105
windows7-x64
1UwU/data/105
windows10-2004-x64
1UwU/data/106
windows7-x64
1UwU/data/106
windows10-2004-x64
1UwU/data/107
windows7-x64
1UwU/data/107
windows10-2004-x64
1UwU/data/108
windows7-x64
1UwU/data/108
windows10-2004-x64
1UwU/data/109
windows7-x64
1UwU/data/109
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
UwU.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
UwU.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
UwU.zip
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
UwU.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
UwU/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
UwU/data.pkl
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
UwU/data/0
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
UwU/data/0
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
UwU/data/1
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
UwU/data/1
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
UwU/data/10
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
UwU/data/10
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
UwU/data/100
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
UwU/data/100
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
UwU/data/101
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
UwU/data/101
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
UwU/data/102
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
UwU/data/102
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
UwU/data/103
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
UwU/data/103
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
UwU/data/104
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
UwU/data/104
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
UwU/data/105
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
UwU/data/105
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
UwU/data/106
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
UwU/data/106
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
UwU/data/107
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
UwU/data/107
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
UwU/data/108
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
UwU/data/108
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
UwU/data/109
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
UwU/data/109
Resource
win10v2004-20231215-en
General
-
Target
UwU/data.pkl
-
Size
60KB
-
MD5
e767fdd035eb3dc2e246c38d91241eeb
-
SHA1
c4faa107ed2218c48f1910b9b759c298127a5d49
-
SHA256
19081e6b4e8adf5cf617c4600d76f94682917301a8376369778f39c649dd1648
-
SHA512
1ce24e38d477ce93d701654fbb8dc3b336b6a8c1304dc07102ae17d334504e011b1128f1c317102811a1f5cb96d21d5b440b1173008ab9b8bae4685534cf458b
-
SSDEEP
1536:eE0IMIR7Gim8tRst+k/Y0/mR0TM0jPSLqYH5uwHOaDsisp:ehIr7GijtOcf5uwHZc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.pkl rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.pkl\ = "pkl_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pkl_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1068 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1068 AcroRd32.exe 1068 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2680 2760 cmd.exe 29 PID 2760 wrote to memory of 2680 2760 cmd.exe 29 PID 2760 wrote to memory of 2680 2760 cmd.exe 29 PID 2680 wrote to memory of 1068 2680 rundll32.exe 30 PID 2680 wrote to memory of 1068 2680 rundll32.exe 30 PID 2680 wrote to memory of 1068 2680 rundll32.exe 30 PID 2680 wrote to memory of 1068 2680 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\UwU\data.pkl1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\UwU\data.pkl2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\UwU\data.pkl"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5933719d7fe1dcfc2ac91c57477c52b17
SHA15e25ce2b0870f75096aaaa897b5966e4a3985787
SHA256999cf7c9607d6c9763f5159ce8b95e6f37cbddf1bceb375c59ba6247bdae5d02
SHA5121d04f6cd0ec904b56524592a4c3b1b9befb9f5313f036d81f680ab28cd37a818d6a5360831169d2b1a31158e2b2e65fa08e027c5eef0ce39a1ef5624d7281d47