Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 09:39
Behavioral task
behavioral1
Sample
Uninstalr_Portable.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Uninstalr_Portable.exe
Resource
win10v2004-20240226-en
General
-
Target
Uninstalr_Portable.exe
-
Size
5.5MB
-
MD5
55cb26504cec040de4d4a6bd430ce2de
-
SHA1
2948e58ca9f3d31c076b2cc5c16d8dba71fd7bf4
-
SHA256
abef6f1ed0b96268121c878a4d49705f80b59c2647f7149957240de13156bfc7
-
SHA512
e57b865cf987b493cd3e8c1bd1a0b5e2ddcde18ca06fc625eedd98a592056a05fd5224876bb23704eff15bb4ff5af229b4bab15d46b63cdec9f4e6e09c725f54
-
SSDEEP
98304:q2XAsLlOuP1JQSBeESX+Ho8FrT/28ylm0AmshxOwxSDCGOp7rgHXo3K:ZXLku0dESdsT/iRArWwnbp7x3K
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x0000000002670000-memory.dmp upx behavioral1/memory/2068-13-0x0000000000400000-0x0000000002670000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000400000-0x0000000002670000-memory.dmp upx behavioral1/memory/2068-15-0x0000000000400000-0x0000000002670000-memory.dmp upx behavioral1/memory/2068-18-0x0000000000400000-0x0000000002670000-memory.dmp upx behavioral1/memory/2068-19-0x0000000000400000-0x0000000002670000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe 2804 powershell.exe 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe 2068 Uninstalr_Portable.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe Token: SeSystemProfilePrivilege 2660 WMIC.exe Token: SeSystemtimePrivilege 2660 WMIC.exe Token: SeProfSingleProcessPrivilege 2660 WMIC.exe Token: SeIncBasePriorityPrivilege 2660 WMIC.exe Token: SeCreatePagefilePrivilege 2660 WMIC.exe Token: SeBackupPrivilege 2660 WMIC.exe Token: SeRestorePrivilege 2660 WMIC.exe Token: SeShutdownPrivilege 2660 WMIC.exe Token: SeDebugPrivilege 2660 WMIC.exe Token: SeSystemEnvironmentPrivilege 2660 WMIC.exe Token: SeRemoteShutdownPrivilege 2660 WMIC.exe Token: SeUndockPrivilege 2660 WMIC.exe Token: SeManageVolumePrivilege 2660 WMIC.exe Token: 33 2660 WMIC.exe Token: 34 2660 WMIC.exe Token: 35 2660 WMIC.exe Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe Token: SeSystemProfilePrivilege 2660 WMIC.exe Token: SeSystemtimePrivilege 2660 WMIC.exe Token: SeProfSingleProcessPrivilege 2660 WMIC.exe Token: SeIncBasePriorityPrivilege 2660 WMIC.exe Token: SeCreatePagefilePrivilege 2660 WMIC.exe Token: SeBackupPrivilege 2660 WMIC.exe Token: SeRestorePrivilege 2660 WMIC.exe Token: SeShutdownPrivilege 2660 WMIC.exe Token: SeDebugPrivilege 2660 WMIC.exe Token: SeSystemEnvironmentPrivilege 2660 WMIC.exe Token: SeRemoteShutdownPrivilege 2660 WMIC.exe Token: SeUndockPrivilege 2660 WMIC.exe Token: SeManageVolumePrivilege 2660 WMIC.exe Token: 33 2660 WMIC.exe Token: 34 2660 WMIC.exe Token: 35 2660 WMIC.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeRestorePrivilege 2716 msiexec.exe Token: SeTakeOwnershipPrivilege 2716 msiexec.exe Token: SeSecurityPrivilege 2716 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 Uninstalr_Portable.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 Uninstalr_Portable.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2804 2068 Uninstalr_Portable.exe 28 PID 2068 wrote to memory of 2804 2068 Uninstalr_Portable.exe 28 PID 2068 wrote to memory of 2804 2068 Uninstalr_Portable.exe 28 PID 2068 wrote to memory of 2804 2068 Uninstalr_Portable.exe 28 PID 2068 wrote to memory of 3048 2068 Uninstalr_Portable.exe 30 PID 2068 wrote to memory of 3048 2068 Uninstalr_Portable.exe 30 PID 2068 wrote to memory of 3048 2068 Uninstalr_Portable.exe 30 PID 2068 wrote to memory of 3048 2068 Uninstalr_Portable.exe 30 PID 3048 wrote to memory of 2660 3048 cmd.exe 32 PID 3048 wrote to memory of 2660 3048 cmd.exe 32 PID 3048 wrote to memory of 2660 3048 cmd.exe 32 PID 3048 wrote to memory of 2660 3048 cmd.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstalr_Portable.exe"C:\Users\Admin\AppData\Local\Temp\Uninstalr_Portable.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Get-AppxPackage -AllUsers | Out-File "C:\Users\Admin\AppData\Local\Temp\Uninstalr_can_delete_x1_259397760.tmp"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic product get InstallDate, InstallLocation, Name, Vendor, Version > "C:\Users\Admin\AppData\Local\Temp\Uninstalr_can_delete_x2_259397807.tmp"2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic product get InstallDate, InstallLocation, Name, Vendor, Version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5a07b60f5b85dc7f90c27efbff5927847
SHA145afba7fb81c0755f9183fac07729bbb580b8dcb
SHA256775450d3ca1ad0367e218d4e468b9d97a48a25e692b8e8510743302e23da64f9
SHA512e2e766c93148ca261a6e1d7b5446c3a95e213384a3abaeccb8c762a19200b40339a6e18d7b382ba0522457c994533cb0612adc99c9ea39a7da8c7d8720e432f8