Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe
Resource
win10v2004-20240226-en
General
-
Target
1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe
-
Size
405KB
-
MD5
8940705a9dee5e2e6dab7279d9e44fbb
-
SHA1
efa9de6c5015cfd51594bea8ea15d88a1cbeb19a
-
SHA256
1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b
-
SHA512
5fdaaa9fea5d8f5f538e7a9eb13f9e4a3b1db695e05b8c2fb89f39e9b218307388d6223a8f79342936363f73dcd7048ce089472a809997df2fcbfd03d73a2522
-
SSDEEP
12288:vdDU6g13sJd1fm/+yb3O2jg82ydU/DdKumy:vdE3sJd1fm/+yb3OYg84/JHJ
Malware Config
Signatures
-
Detects executables containing base64 encoded User Agent 2 IoCs
resource yara_rule behavioral2/memory/1744-12-0x0000000010000000-0x0000000010033000-memory.dmp INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent behavioral2/memory/1744-16-0x0000000010000000-0x0000000010033000-memory.dmp INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/files/0x000c000000022f7b-2.dat UPX behavioral2/files/0x0008000000023254-8.dat UPX behavioral2/memory/1744-11-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral2/memory/1744-12-0x0000000010000000-0x0000000010033000-memory.dmp UPX behavioral2/memory/1744-16-0x0000000010000000-0x0000000010033000-memory.dmp UPX -
Deletes itself 1 IoCs
pid Process 2096 ueluo.exe -
Executes dropped EXE 2 IoCs
pid Process 2096 ueluo.exe 1744 xik.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 xik.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VIEW = "c:\\Program Files\\avrby\\xik.exe \"c:\\Program Files\\avrby\\xikct.dll\",Viewer" xik.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: xik.exe File opened (read-only) \??\a: xik.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 xik.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification \??\c:\Program Files\avrby ueluo.exe File created \??\c:\Program Files\avrby\xikct.dll ueluo.exe File created \??\c:\Program Files\avrby\xik.exe ueluo.exe File opened for modification \??\c:\Program Files\avrby\xik.exe ueluo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString xik.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1744 xik.exe 1744 xik.exe 1744 xik.exe 1744 xik.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1744 xik.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3708 1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe 2096 ueluo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1408 3708 1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe 90 PID 3708 wrote to memory of 1408 3708 1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe 90 PID 3708 wrote to memory of 1408 3708 1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe 90 PID 1408 wrote to memory of 4688 1408 cmd.exe 92 PID 1408 wrote to memory of 4688 1408 cmd.exe 92 PID 1408 wrote to memory of 4688 1408 cmd.exe 92 PID 1408 wrote to memory of 2096 1408 cmd.exe 93 PID 1408 wrote to memory of 2096 1408 cmd.exe 93 PID 1408 wrote to memory of 2096 1408 cmd.exe 93 PID 2096 wrote to memory of 1744 2096 ueluo.exe 94 PID 2096 wrote to memory of 1744 2096 ueluo.exe 94 PID 2096 wrote to memory of 1744 2096 ueluo.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe"C:\Users\Admin\AppData\Local\Temp\1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\ueluo.exe "C:\Users\Admin\AppData\Local\Temp\1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\ueluo.exeC:\Users\Admin\AppData\Local\Temp\\ueluo.exe "C:\Users\Admin\AppData\Local\Temp\1f33e14b054b821e5ffe0ae8377d096cad493a3087f4fea0b5f30eac7a46180b.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\Program Files\avrby\xik.exe"c:\Program Files\avrby\xik.exe" "c:\Program Files\avrby\xikct.dll",Viewer C:\Users\Admin\AppData\Local\Temp\ueluo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
406KB
MD5911cd4df50a3bcfd3f5c2e804d74a68a
SHA1db959ef254bec71562d12f1702112e4a5534b941
SHA2565747395e25a22a2f1d441910d17afd12b152848adb2d2fa1da3ee72d47d5f1c8
SHA512cf8f4664656a64f57c046ab5455d370b9da83406fe5a0f034df65eb4b2e26147aa479d04c2107c35aa7e903c32eb7b77fe7b02f40bc276a7c664026d8f604562
-
Filesize
89KB
MD56e5ec505533ac5b9e92ab61c4ed8aecb
SHA1257c19b19c4b1611bf3f388617bd594e5542fafa
SHA25690485af8606b9a7894db94f385efcbba42518ef5ca79c1feb42aa675f1a5a7ba
SHA512506f7d21971959c6dc2e9404fc68daf8b8e9484c1de15f0a704cff4dac08d968e85c974d07d8cdf0696881a93cc078facbcb1100d81e03677e6985bfd3f18080