Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe
Resource
win10v2004-20240226-en
General
-
Target
cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe
-
Size
69KB
-
MD5
594c788a2ada52e89fd02e266f6d8aa0
-
SHA1
fd7e5af4f7f6a98e738e047fac322387bcc4ddcb
-
SHA256
cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852
-
SHA512
4790792043fcb67fdf6dd68fdae82a633d2f170c0dacb18db86539388f0208a99a5b28f7b9b3b0575696d1c7c401a8606061bbf3b328e10847d8329fd4b1a91c
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8fya:Olg35GTslA5t3/w8f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" uvtaxeaf.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{554D4C43-5747-534c-554D-4C435747534c} uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{554D4C43-5747-534c-554D-4C435747534c}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{554D4C43-5747-534c-554D-4C435747534c}\IsInstalled = "1" uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{554D4C43-5747-534c-554D-4C435747534c}\StubPath = "C:\\Windows\\system32\\oukpeakid.exe" uvtaxeaf.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\evdogos.exe" uvtaxeaf.exe -
Executes dropped EXE 2 IoCs
pid Process 3688 uvtaxeaf.exe 1828 uvtaxeaf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" uvtaxeaf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" uvtaxeaf.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\atneveh.dll" uvtaxeaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" uvtaxeaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} uvtaxeaf.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\uvtaxeaf.exe cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe File opened for modification C:\Windows\SysWOW64\evdogos.exe uvtaxeaf.exe File opened for modification C:\Windows\SysWOW64\atneveh.dll uvtaxeaf.exe File created C:\Windows\SysWOW64\atneveh.dll uvtaxeaf.exe File opened for modification C:\Windows\SysWOW64\uvtaxeaf.exe uvtaxeaf.exe File opened for modification C:\Windows\SysWOW64\uvtaxeaf.exe cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe File created C:\Windows\SysWOW64\evdogos.exe uvtaxeaf.exe File opened for modification C:\Windows\SysWOW64\oukpeakid.exe uvtaxeaf.exe File created C:\Windows\SysWOW64\oukpeakid.exe uvtaxeaf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 1828 uvtaxeaf.exe 1828 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe 3688 uvtaxeaf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1884 cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe Token: SeDebugPrivilege 3688 uvtaxeaf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3688 1884 cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe 91 PID 1884 wrote to memory of 3688 1884 cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe 91 PID 1884 wrote to memory of 3688 1884 cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe 91 PID 3688 wrote to memory of 1828 3688 uvtaxeaf.exe 92 PID 3688 wrote to memory of 1828 3688 uvtaxeaf.exe 92 PID 3688 wrote to memory of 1828 3688 uvtaxeaf.exe 92 PID 3688 wrote to memory of 588 3688 uvtaxeaf.exe 5 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57 PID 3688 wrote to memory of 3440 3688 uvtaxeaf.exe 57
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe"C:\Users\Admin\AppData\Local\Temp\cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\uvtaxeaf.exe"C:\Windows\system32\uvtaxeaf.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\uvtaxeaf.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
72KB
MD5f957dda09bd6fed2c60c690d3589bf06
SHA139be6877813c01261aa29cefc668b5acbb612b25
SHA25643ce63ef5bc0b26af2dfdbdd16e917d7424c7d25d456b1068ba710c240a89ec1
SHA51299933676d2789ec52b408531ff5c741e3b98370057111aaefc333ee42d1def3eaa9466bedde219ba3ea6c9725240fd5ee1bca7bb39d5842ffb2a53ad48590fbc
-
Filesize
71KB
MD526aa12ad8555ff8a6c2bbbaf6cb63d73
SHA12ee2f9212b8972dfa201c8213691eefe47acc802
SHA2565e0c7d14f1cb59c5ba7d9955cb4099da6cc29f7c6eee4b1abb70e83a017839e9
SHA5127696ce32779b941ed8139afd1263857082d155a798365cf10c67440d5cf69c83345707fc3e02fba1d3ebcdff4a336b33f6d34db0c45d667e77de5b2e2e89e662
-
Filesize
69KB
MD5594c788a2ada52e89fd02e266f6d8aa0
SHA1fd7e5af4f7f6a98e738e047fac322387bcc4ddcb
SHA256cafe361d24889294daec72b6525fa7c51072aa929045cda815dd2063dfc86852
SHA5124790792043fcb67fdf6dd68fdae82a633d2f170c0dacb18db86539388f0208a99a5b28f7b9b3b0575696d1c7c401a8606061bbf3b328e10847d8329fd4b1a91c