Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
9hwid pack/...sk.exe
windows10-1703-x64
6hwid pack/...up.exe
windows10-1703-x64
3hwid pack/...RU.exe
windows10-1703-x64
3hwid pack/...ll.exe
windows10-1703-x64
3hwid pack/...rt.exe
windows10-1703-x64
5hwid pack/...64.exe
windows10-1703-x64
5hwid pack/...IN.exe
windows10-1703-x64
3hwid pack/...64.exe
windows10-1703-x64
1hwid pack/...16.exe
windows10-1703-x64
hwid pack/...IT.exe
windows10-1703-x64
1hwid pack/...LL.dll
windows10-1703-x64
3hwid pack/...YS.sys
windows10-1703-x64
1hwid pack/...64.sys
windows10-1703-x64
1hwid pack/...64.sys
windows10-1703-x64
1hwid pack/...lp.pdf
windows10-1703-x64
3hwid pack/...rt.exe
windows10-1703-x64
3hwid pack/...Un.exe
windows10-1703-x64
6hwid pack/...Un.exe
windows10-1703-x64
6hwid pack/...ew.chm
windows10-1703-x64
1hwid pack/...ew.exe
windows10-1703-x64
6Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01/08/2024, 21:16
Behavioral task
behavioral1
Sample
hwid pack/HardDisk.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
hwid pack/MacSetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
hwid pack/monitor serial/CRU.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
hwid pack/monitor serial/reset-all.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
hwid pack/monitor serial/restart.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
hwid pack/monitor serial/restart64.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
hwid pack/serial changer/AMIDEWIN.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
hwid pack/serial changer/AMIDEWINx64.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
hwid pack/serial changer/DMI16.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
hwid pack/serial changer/DMIEDIT.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
hwid pack/serial changer/UCOREDLL.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
hwid pack/serial changer/UCORESYS.sys
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
hwid pack/serial changer/UCOREW64.sys
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
hwid pack/serial changer/amifldrv64.sys
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
hwid pack/uninstall/Revo Uninstaller Help.pdf
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
hwid pack/uninstall/RevoUPort.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
hwid pack/uninstall/x64/RevoUn.exe
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
hwid pack/uninstall/x86/RevoUn.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
hwid pack/usb device serial/USBDeview.chm
Resource
win10-20240611-en
Behavioral task
behavioral20
Sample
hwid pack/usb device serial/USBDeview.exe
Resource
win10-20240404-en
General
-
Target
hwid pack/uninstall/x86/RevoUn.exe
-
Size
12.1MB
-
MD5
bc5307a2b996f8994c4c93983a81fb05
-
SHA1
2df1b09e0d4cf2cffd66b61fc7014c29219b393b
-
SHA256
787a813efcdbfac68d0df2392beb1cde23b15958ea569a6506d64dec70709501
-
SHA512
a4bd1a6271401acd82d973eb04f67e941de85c50d1b04607f89029a92555b52390d118090f7e5ff125e4eb3931f37995f67c6adc6927f8df19fb0ee9360780ca
-
SSDEEP
196608:ndKABE/NdoCTHwPWpGplR806IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIA8Z:UoPWpGplR8ZW
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4184 2184 WerFault.exe 72 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RevoUn.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe 2184 RevoUn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hwid pack\uninstall\x86\RevoUn.exe"C:\Users\Admin\AppData\Local\Temp\hwid pack\uninstall\x86\RevoUn.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 29602⤵
- Program crash
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5b26a346eaf03ef14ee56a8b6eb98aa1e
SHA1f358ab0a8df9c739bfb9d0162e571a1c57a14459
SHA2568a6047754939db36ca953888c4e58bdcb6253edc23e6396e33b1f151e9f74c1f
SHA512deda2ee0040b44411a58809a00cebb14750e4668ed0c108e61dd08532f3326d504d8b0ff81ca1b1ce7a1999ce40a9f41ac3d56f85e51b1dca8e646e80fb3e991
-
Filesize
3KB
MD51ae03f6a5dc67f46c66fcaeea37fe3ec
SHA1bb2f160c2c427506cdcc740066e1a4efac83b798
SHA25634e4756831c52114c71d041333b2005e5f650628a1950043a3d2f5e6a1b1c971
SHA512088d2f7e86e3269ce9371abf9676480d619092235267fb7a973b51af684114e0bc7b67bc5b60680b5d4784b881ad3d361acdc21efe7a042d3652fde03e456c75
-
Filesize
3KB
MD57c2eabc8cfc88df46b84012d1ab20cf0
SHA1253380087229013a4e0affc8cf84c08b8edcc97f
SHA256620babc36e5ace84cec0595835a5ea85a6674724bdee5eab6c3a81dc5c5da57a
SHA512968f72f21542139759539fc7f7da38a2a420b41ebf8519f7392695d60538aaa12e347dd33fd361ff2736ce29c4c9d30107501ab1d11c04ab15b6e005f5dad920