Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3bdcd08123d...18.exe
windows7-x64
7bdcd08123d...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/gtapi.dll
windows7-x64
3$SYSDIR/gtapi.dll
windows10-2004-x64
3$TEMP/Goog...ed.msi
windows7-x64
6$TEMP/Goog...ed.msi
windows10-2004-x64
6UUPlayer.dll
windows7-x64
3UUPlayer.dll
windows10-2004-x64
3UUSeePlayer.exe
windows7-x64
10UUSeePlayer.exe
windows10-2004-x64
10bass-plugins.exe
windows7-x64
7bass-plugins.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CoCode.dll
windows7-x64
3CoCode.dll
windows10-2004-x64
3UFDeMux.dll
windows7-x64
3UFDeMux.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
bdcd08123d21c1c5c7a1a3cd95096437_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdcd08123d21c1c5c7a1a3cd95096437_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$SYSDIR/gtapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$SYSDIR/gtapi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/GoogleToolbarInstaller_zh-CN_signed.msi
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$TEMP/GoogleToolbarInstaller_zh-CN_signed.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
UUPlayer.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
UUPlayer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
UUSeePlayer.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
UUSeePlayer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
bass-plugins.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
bass-plugins.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
CoCode.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
CoCode.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
UFDeMux.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
UFDeMux.dll
Resource
win10v2004-20240802-en
General
-
Target
UUSeePlayer.exe
-
Size
1.1MB
-
MD5
ec9624b5b7557ce9fccf7c34f2a5a3ae
-
SHA1
bdf4369f25dfcc9a49f9fa84ade190a99d7ff910
-
SHA256
501e5e748e4df5b13382e8f932a7a11fc311b91059863fbbcc94bc9e41d597d3
-
SHA512
9c443b0d2452517ba1ce0679afb063fe26e2eaa0c42d9e2018f466c27fe7939172c266ed65a1968e9cd9fbb17c18c6616a6f1e34fa473b1684f44e0c58b59d6e
-
SSDEEP
24576:2ShKos1i1C8d+qvJJ77IZA+ELJMs8KUV2:tUq+g0651
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List UUSeePlayer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile UUSeePlayer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe:*:Enabled:UUPlayer" UUSeePlayer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\struct~.ini UUSeePlayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UUSeePlayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main UUSeePlayer.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" UUSeePlayer.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" UUSeePlayer.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ucf\ = "UUSEE.ucf" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\ = "URL:UUSEE Protocol" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open\command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\DefaultIcon UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open\Command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\shell\open\command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE\URL Protocol UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\ = "URL:UUSEENOTIFY Protocol" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\ = "URL:UUSEEREC Protocol" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\URL Protocol UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\ = "UUSEE Media File" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\URL Protocol UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -v UUPlayer -url \"%1\"" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\" -file \"%1\"" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell\open\command UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEENOTIFY\shell UUSeePlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEE.ucf\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UUSeePlayer.exe\",-150" UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UUSEEREC\shell UUSeePlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ucf UUSeePlayer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe 4028 UUSeePlayer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe"C:\Users\Admin\AppData\Local\Temp\UUSeePlayer.exe"1⤵
- Modifies firewall policy service
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD553e0ef76c32466cd92cf9ccc738ee1e4
SHA19ca4e9335799031a2e4231221514af62a40b2e1b
SHA2560b7937e6d9fa6bf055adf56b5b6a76ad140426970a33eae2fada4fc8af782e70
SHA5126f330f91d15f1d74a0d0f2c5e791ef3f659c509174a6a36a5bf228c1be7640d35633583cb80104c7dd7faee4ee19d6f6437b8374a8b76084c117cdcdf848c644
-
Filesize
419B
MD5aae06f9422c472669168866253a25f38
SHA1a0cc595dddc5adfe3d9f67d002c89d88e5fd728f
SHA25637a37694c498c28fd1c6f5634da22b7624f7511940677f59e600da6066dc66f4
SHA512efab9564c49d6593f35ef51aa91387fdab29cbf85396bc0f94960db7d485bb9e771ea462537396d329b9d7c7152b7e02494acdfce9d1f3ffd6028a5e48b2ada0
-
Filesize
553B
MD545a12ef44895add34325c46ef648ebac
SHA11cb414414c5de40ec3454a29a87da6d04b9052d9
SHA256bcef7641260359a67921ae73a6e999eaba9dca2e23ed9c964c821a5848f0dbde
SHA512d777b357d4d31d7440f0b918db84d949eb515f55a565aff21ca6d09f94e107c3145e8358ef9e282c2d75d7c6ab926079394073b30c8de8d9a6400f1fc589dde7
-
Filesize
728B
MD51f88a4993e3810ecbf24d99aeeaf1d8e
SHA1dedb7989ed714f72a293ffc59a7af48831d57fc7
SHA256acd1e2205455fa12fd899db80b5e1e6176d2b0c1b4021edcab5f31c0aafc658c
SHA51240a4f5a8c76db8489087dca6ce0bd4310016c9afaae07214fa14096b623331bc12ea67e0b550a4f160751eb79710ce89b8e0864c57be99cc15c1599ecb49ec15
-
Filesize
204B
MD5ed0b379229602df087441a94b41a16e1
SHA12facf512948ae2414ebf61e2d142fb2e671dce21
SHA2567bde990763131a82c81fb111f735f08aef111c0f235553734f3656372f5626c2
SHA512ecf323e59a669bbfff52d1b426a2bffcd19bcd1b84b6fa185c6d2a9166b66404f4119388ce56a7516241f1b87a3695ba929a6ef7baa784d72d0d4388efe52164
-
Filesize
204B
MD596a0100340d1df27264f3f78f3d13abf
SHA15f1349e8432e40f3cb7c18903b46c849f726cb58
SHA25638957c2db953f7eca369f041eba8a7caeb1aadf7e493d6ed0f921837de25b7cf
SHA5123115e287170e195b138f8a91001ce3ae7fc6d234194829a400ba6ad26a1287c170551f96fefaece9a9c34ead89b9884a2f5db779c0cce44a3abefafca8a3f8cc