Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 13:21

General

  • Target

    UltraISO Premium Edition v9.7.3.3629 Retail Ml_Rus DC 17.07.2020/uiso97pes.exe

  • Size

    4.6MB

  • MD5

    a1d6e9895f67694580016c6a07793bc2

  • SHA1

    29ba651096f6a94b2aec3f3b94909748a259753e

  • SHA256

    3204a6b52e4698fddf35a8e67bf3af5f924c1ccef75da7c48d95be1226b554ff

  • SHA512

    3c3da1dda2aafbb951b15c2e1751d1c71ceeb4f46ff77e5be6d10cb7c760fd1c8358ba4dd11a13ea618b91f525e49f35ef2041a1f9288062b1ead0f84d3d38c6

  • SSDEEP

    98304:U5Yjo3qYXNRnxofbalqVHzSesntuS0xK0yjqio3KIMYZrx7ICCpSSMD6OqljCvl:djsvRxofbAq9zSesntcjyNkMyrx7IzjA

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 58 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UltraISO Premium Edition v9.7.3.3629 Retail Ml_Rus DC 17.07.2020\uiso97pes.exe
    "C:\Users\Admin\AppData\Local\Temp\UltraISO Premium Edition v9.7.3.3629 Retail Ml_Rus DC 17.07.2020\uiso97pes.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\is-9OPK7.tmp\uiso97pes.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9OPK7.tmp\uiso97pes.tmp" /SL5="$4010A,4329604,128000,C:\Users\Admin\AppData\Local\Temp\UltraISO Premium Edition v9.7.3.3629 Retail Ml_Rus DC 17.07.2020\uiso97pes.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\UltraISO\isoshl64.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:1576
      • C:\Program Files (x86)\UltraISO\drivers\isocmd.exe
        "C:\Program Files (x86)\UltraISO\drivers\isocmd.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1376
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\UltraISO\Readme.txt
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:2004
      • C:\Program Files (x86)\UltraISO\UltraISO.exe
        "C:\Program Files (x86)\UltraISO\UltraISO.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\UltraISO\Readme.txt

    Filesize

    2KB

    MD5

    bff30d893fc39cf16544a3ae18e72d33

    SHA1

    027219b92ade452de2757d5460618a73c3ab7aa7

    SHA256

    904e402e59d1b093378516064bffb2a7d06fb53c1422615724292640cb2f7c0a

    SHA512

    f56cc68b15b0e17fa15e4d8cf4c22995a2a3dc46c2201143fa86195088a64fa2c3b54d587b481d1f219ea894c1e09d9ecd254f2189dede94bdb7a6d4348a6945

  • C:\Program Files (x86)\UltraISO\drivers\ISODrv64.sys

    Filesize

    121KB

    MD5

    be68c42760724fb9931bb38e921cd3cb

    SHA1

    56c64b258d16b8e5307a1ddd28d980235c757357

    SHA256

    aeea7670c130ff659f09d8daf200ab8f429d307a483936aee9efb849e33b3064

    SHA512

    6b7cf20e12aba6116f256b930bdda2c48ed60a5db76c8a1291641dc6a26bd1e371bc1efcba16dae4ecf2463a39afcf9904ec3b29cba1ddc5df6f546ab5a56e42

  • C:\Program Files (x86)\UltraISO\drivers\IsoCmd.exe

    Filesize

    26KB

    MD5

    26bff94babb8a0ccb74bcdbba7a67f82

    SHA1

    703ad751f975b6bcd1b165e41a1a4b5d44842015

    SHA256

    28d530f9e46c6fc9fa66c4f7f232c57b3d5d9287840c13e187d513358ed12a5d

    SHA512

    4f41a4b92f4d5cdfc7cb0ff4657e12172f3a5cd997ebb76468286a69256fbb611b21b577597743a4d7f1aefacf52c03bf8d5ed8505ffc048d3dcda0556ad1b05

  • \Program Files (x86)\UltraISO\UltraISO.exe

    Filesize

    5.2MB

    MD5

    94b0019cb77dc79b19483d0e129e4667

    SHA1

    1c52c8abb8218746e701f9ce0296395f75bbb05d

    SHA256

    e8741d2eb9c7c37a818a43e42c9dad5305182f154cd6a4659f0dac0dce951539

    SHA512

    9c05a9a66080a8c51bb1c1478f86e1699da604ab8b4f8df1d36f1cd9450646554b303a95e2c360c8933f8cf64adc0f036b0366f88e2a9e5db25f15531a75c31f

  • \Program Files (x86)\UltraISO\isoshl64.dll

    Filesize

    151KB

    MD5

    c0fc6c67bd9d9fbc4f8ad44232d49d11

    SHA1

    e5ad2b56cc20652401ee5c60fe118cf3fb474a7b

    SHA256

    50df2e7ba2ab1892dd1e8c03be51a1dfa9c1ecc501d5166cd5e69badb4a8c503

    SHA512

    74bc8d2d93c870f0449582b6de60ade9b0322a5cca945beac8842ccd4577569ea97a7089163dcff8b0115ebbaf2ae75d09ae5214efcb8ea6902c80a2cc0e5586

  • \Program Files (x86)\UltraISO\unins000.exe

    Filesize

    776KB

    MD5

    807124784f31a75c636f9970fd1ae5f0

    SHA1

    f42e996539127b6bfe62ebbc8cc09878503df2aa

    SHA256

    28a17164feda8369165faa610f5b3feff4b8b6f78f7444bf86c53a81c003e7a9

    SHA512

    86f4c63368ab6de5bf2c7019b366dd9bf0a55314295df09c7548c3d1a299e76607d353688bacc1c14992003d74d94506a74b637c9517f79eb598770383304750

  • \Users\Admin\AppData\Local\Temp\is-9OPK7.tmp\uiso97pes.tmp

    Filesize

    765KB

    MD5

    0856978f29ae90dc02a700a33fe0302e

    SHA1

    c71d25f4418ecdbd30da98a6ab0804ecca2a800b

    SHA256

    45b137a10ad4eb65b6d04dcb768e88ba372e2b36fca1e44060bd9517d71f49f1

    SHA512

    4d07c277987d28c731cb7435b27010e7cbe7448b865fd138a6299e8ccbf9d172a47d5477e554084e2d608212fcc3d07b97fb1bd53b56fb1e18ce50ee4acf3119

  • memory/1644-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1644-10-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1644-2-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/1644-167-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2036-13-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2036-11-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2036-9-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2036-165-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2260-168-0x0000000000400000-0x0000000000E22000-memory.dmp

    Filesize

    10.1MB