Overview
overview
7Static
static
7VirtualTreesD7.dll
windows7-x64
3VirtualTreesD7.dll
windows10-2004-x64
3autoupdater.exe
windows7-x64
7autoupdater.exe
windows10-2004-x64
7fos.exe
windows7-x64
7fos.exe
windows10-2004-x64
7license.rtf
windows7-x64
4license.rtf
windows10-2004-x64
1rtl70.dll
windows7-x64
3rtl70.dll
windows10-2004-x64
3uninstaller.chm
windows7-x64
6uninstaller.chm
windows10-2004-x64
6uruninstaller.exe
windows7-x64
7uruninstaller.exe
windows10-2004-x64
7vcl70.dll
windows7-x64
3vcl70.dll
windows10-2004-x64
3vclx70.dll
windows7-x64
3vclx70.dll
windows10-2004-x64
3yufilter.dll
windows7-x64
3yufilter.dll
windows10-2004-x64
3安装说明.url
windows7-x64
1安装说明.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 00:05
Behavioral task
behavioral1
Sample
VirtualTreesD7.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VirtualTreesD7.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
autoupdater.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
autoupdater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
fos.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
fos.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
license.rtf
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
license.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
rtl70.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
rtl70.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninstaller.chm
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
uninstaller.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uruninstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
uruninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
vcl70.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
vcl70.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
vclx70.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
vclx70.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
yufilter.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
yufilter.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
安装说明.url
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
安装说明.url
Resource
win10v2004-20240802-en
General
-
Target
uruninstaller.exe
-
Size
2.7MB
-
MD5
5561091b596cb5b009147a7f0cadd8ee
-
SHA1
76e32505bb61805741a8e68e70a180e5916c93a1
-
SHA256
e07f1ba143b59f9dfc78681bf6a85a68536916891ec0856e926c67388292208e
-
SHA512
9d957be4d4bdb13f29c815bd08092340f4ae524f479a198200b1d89a5aceda2b9fb13ad24e8177c29e97e3efae8b6a2e1d7d0f67c8e06a8fc150b4ec18c1ddd4
-
SSDEEP
49152:58YYrpfY4EMZAeT0eVCgNwWd5+R/9+9kYNRAW+CymsPgEU5:FupfhqeTdYg+l9+9kkRAW1YjO
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uruninstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate uruninstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uruninstaller.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1} uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\ = "Microsoft Graph Application" uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\InprocHandler32\ = "ole32.dll" uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\Implemented Categories\{000C0118-0000-0000-C000-000000000046}\ uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\InprocHandler32 uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\LocalServer32 uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\VersionIndependentProgID\ = "MSGraph.Application" uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\Implemented Categories uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\Implemented Categories\{000C0118-0000-0000-C000-000000000046} uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\LocalServer32\ = "\"C:\\Program Files\\Microsoft Office\\Root\\Office16\\GRAPH.EXE\" /automation" uruninstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\ProgID\ = "MSGraph.Application.8" uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\VersionIndependentProgID uruninstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3429774-BCAB-E9C0-8E36-70963CF853B1}\ProgID uruninstaller.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 768 uruninstaller.exe Token: SeIncBasePriorityPrivilege 768 uruninstaller.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b42698491bbb1f0eebc53e9bf24df6d
SHA1a287a82c5585c65e143d2e8bec4f9721ba72f63f
SHA256131d84499ab7be96dbfa35745ec81f7a8d27370de14a29a0c194be6dce0eaa9d
SHA512143f21a42e14d2a044035d552d66cf95e28da4f42d09183166ded970692a3508da72bbd8fc884012ebc6ff069d9faf7669176d0418eddedfcce497668b18ecc1