Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe
Resource
win10v2004-20240226-en
General
-
Target
05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe
-
Size
402KB
-
MD5
d854b3e2d53a589a6bedb6c8a8d1f3b8
-
SHA1
0f18692da2e5707e320aed6b4abfed2f6b990e9b
-
SHA256
05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb
-
SHA512
babe92247fe3fccdaaa3457c7afbe02ccb458157fd915bd2573a23d55e25575010c02ff39d17824de1330b2ed4f0b6d213dfd3df78165ae21c57525de54f7856
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 14 4404 rundll32.exe 24 4404 rundll32.exe 38 4404 rundll32.exe 39 4404 rundll32.exe 41 4404 rundll32.exe 42 4404 rundll32.exe 48 4404 rundll32.exe 51 4404 rundll32.exe -
Deletes itself 1 IoCs
pid Process 748 ueoyra.exe -
Executes dropped EXE 1 IoCs
pid Process 748 ueoyra.exe -
Loads dropped DLL 1 IoCs
pid Process 4404 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dotx = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\Program Files\\smuak\\cgsdw.dll\",Verify" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\x: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\w: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4404 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\smuak ueoyra.exe File created \??\c:\Program Files\smuak\cgsdw.dll ueoyra.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe 4404 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4404 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4908 05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe 748 ueoyra.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3632 4908 05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe 94 PID 4908 wrote to memory of 3632 4908 05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe 94 PID 4908 wrote to memory of 3632 4908 05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe 94 PID 3632 wrote to memory of 1720 3632 cmd.exe 96 PID 3632 wrote to memory of 1720 3632 cmd.exe 96 PID 3632 wrote to memory of 1720 3632 cmd.exe 96 PID 3632 wrote to memory of 748 3632 cmd.exe 98 PID 3632 wrote to memory of 748 3632 cmd.exe 98 PID 3632 wrote to memory of 748 3632 cmd.exe 98 PID 748 wrote to memory of 4404 748 ueoyra.exe 99 PID 748 wrote to memory of 4404 748 ueoyra.exe 99 PID 748 wrote to memory of 4404 748 ueoyra.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe"C:\Users\Admin\AppData\Local\Temp\05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\ueoyra.exe "C:\Users\Admin\AppData\Local\Temp\05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\ueoyra.exeC:\Users\Admin\AppData\Local\Temp\\ueoyra.exe "C:\Users\Admin\AppData\Local\Temp\05c0b4a72c242a3a6462da908883eccd7855dd9486d0395f386082f4b4c82abb.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\Program Files\smuak\cgsdw.dll",Verify C:\Users\Admin\AppData\Local\Temp\ueoyra.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4260 --field-trial-handle=3488,i,1267426273081718772,6254127258555406296,262144 --variations-seed-version /prefetch:81⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD5b19f294b3f49d829d52d8c857f348887
SHA1497deeeae481572f32aaf4ee64a51df63965e6be
SHA256ffd6b1006114166253f39f55e409a77b0a0b00467274428903dc5acf7aed3b7e
SHA512bd5e73a6de3f6b0fd40ee2b69d9d563c661b14083351436ab6d577139d2cfd9027803c667a11e96409c2e9f715857eb7e176e3842ff70a0ab38f1f7880f462b3
-
Filesize
228KB
MD507ec3c5e91a61011bb3d72781b3e040f
SHA1bfcfc935ffdbccfa16ca3321a50ba3d5afb6feff
SHA256779fd53045d2163c9ca997dd1cb6e1da05088c449085a52571201319c578e24b
SHA5124eba29e9daccf2a644aa44b6c3c4002444a01a37ed2de96cee7ffdbe8fa86881629130fd22c9093b06c5b2618479ce3426c781ea04ad592d615c1243c88193e6