Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 20:17

General

  • Target

    UltraAdwareKiller.exe

  • Size

    17.0MB

  • MD5

    c2708a1c9d281c7c0c8b9fbe79bf0343

  • SHA1

    f21a15f0e68ee0f162f3854afc7358f4a1ae5571

  • SHA256

    bd266e45f2eaee374e5a66cde097bd8a273f2ee6f42cf08a1e65222293263f13

  • SHA512

    5fde87111c80ae4d0a65ffec1a1d0b1388f9e7fe0c0d33045a3173a6eb68bac3d60485d5565a56685ca52736a75d94ab45d6c66a6fc4656e3a0c0d68a76699fb

  • SSDEEP

    393216:HX3bbsi2rqriNvbj8lHk7H+tG0SRRv3fIKploxB1ji32Q7uQuQPPP:HPtGj8lHsHRBv3Zn01WWMPPP

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UltraAdwareKiller.exe
    "C:\Users\Admin\AppData\Local\Temp\UltraAdwareKiller.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\UltraAdwareKiller64.exe
      \\?\C:\Users\Admin\AppData\Local\Temp\UltraAdwareKiller64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Ultra Adware Killer\Settings\settings.ini

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\ProgramData\Ultra Adware Killer\UAKdb.txt

    Filesize

    9B

    MD5

    90118f9284f6c2e00aaa1bbda3eac67b

    SHA1

    9855d85e46f712e6eede62516bd16a9cb41a650c

    SHA256

    200340efe503523f3a958917f49aa22677ad47abc7c4bd49a660bf4df7d8c2b3

    SHA512

    43ca7f1f815cebb1dfcfba7e446f75a136d0e44fb580f02b1e9966c9d222e97eebb28ea14f68ffa99dea67f33de3aff434e4a3af7a0ddc443b0b37af17bee583

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D6E2330B1723FACB0955B460D99C4EBD

    Filesize

    471B

    MD5

    8db0330aa761b10b114378c0c42c37c8

    SHA1

    c8c8e1284e69b50313b2bde6a3adebfb40270c08

    SHA256

    6e1f8bbbedc899f2ff2cfee9dfde23e48a9a71c578b54024382158816a813e1c

    SHA512

    1716add674703e29dc506a3f0784e9abf93236b5354a9c2f01d1de946f844df23add39ecc0d5a736c683b0f3713e9608f2dd194e561fa0a0b2ba9057e590f1cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_F24AE254AC712022CD7275ECC89876F9

    Filesize

    471B

    MD5

    6b3e71d39311ca29fb76d2dfdaa84774

    SHA1

    8a2e5c86eea058587951818db14312e94e89004e

    SHA256

    dd4402ea2cdfe9262ef2427bdb67c32eb7a4705ed830c5e0d819500bf01e9eef

    SHA512

    250f895472ee42b7e17dc42b2aef46fc1aa814788fcdbee4d3df26700b17b92243f63b0f44ff51ec06bda71eecc8a0c10c0cdea8d062a395e7fd381f2fe6269e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D6E2330B1723FACB0955B460D99C4EBD

    Filesize

    420B

    MD5

    974d63c171a40309f1defcc2e6bb4437

    SHA1

    d58d18235b19a12726cf7643559e8016d7771525

    SHA256

    69ff49d65830ff5b038f7f95b3e029f44d0efde643d74dc4c9dc26b12065d873

    SHA512

    1437950429692943f9ab7c0629a3e2d868809a46e8e1ed8041b467c633ef8931c64c3290dad24606529c571a68581d8b1a542b8c9e76508912af464693df5b22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_F24AE254AC712022CD7275ECC89876F9

    Filesize

    416B

    MD5

    ada65fb857f7fc25bc6e1273cc4570e1

    SHA1

    07877ba6b2b11405d487eaa4d74cdc50a1e07ac1

    SHA256

    0a196895d9d947186b4daa1d816bfeac3f33da58afc8ee76e8b8ee245bdb8df2

    SHA512

    8ff8b8acf433de115dfdcb807483e45c2c7a9aa4905ba8bbae64da562ee2d7c18bafeef62e103b65b02da94203cc4b3a32aaa55d4e62f734701f1dce3b1f874e

  • C:\Users\Admin\AppData\Local\Temp\UltraAdwareKiller64.exe

    Filesize

    1.4MB

    MD5

    be1337e46729ee8520cf4a83d085a716

    SHA1

    e657e14cb1fd93a2b0ada61ad7ae7aa43c0adef1

    SHA256

    51cc0727670f79e5cd450ebd1aa5b89f8b8d842c3868128fdc9c7a483967f231

    SHA512

    74fe6cd26288e00f9f756c6d0886f8be86414e08e6b44f86658329c8858109ea47e8f07585d8c5f5b58f214d13a7733eb09f3dbf88fdbdc279e43c8d7a474f5d