Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 08:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Uvprxon.exe
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Uvprxon.exe
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
Uvprxon.exe
-
Size
2.6MB
-
MD5
808ef768e73345ad1677ba68f6a8b888
-
SHA1
51a104e1b0b919a18b4a3f47118d885467908349
-
SHA256
a1e3c63db6309035315f2b154a089fbffc688e3bebbf6c6da804f2d2b00622d9
-
SHA512
5a11238576885d64c9b7d0797423c5e0560ebe7079a5778e7873d95790f29e5c87fb3ff2e45006c27f408f6d9ced55a2350ee40219504b07b337d5e4d242970a
-
SSDEEP
49152:RcV6+fQ2yism1FFcznaaZml/bzhRwjl+sXS6CHNf:WV6+fQ2yismuNml/bdYwwSH
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hmtiyouah = "C:\\Users\\Admin\\AppData\\Roaming\\Hmtiyouah.exe" Uvprxon.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4908 468 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uvprxon.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 468 Uvprxon.exe 468 Uvprxon.exe 468 Uvprxon.exe 468 Uvprxon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 468 Uvprxon.exe Token: SeDebugPrivilege 468 Uvprxon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 4908 468 Uvprxon.exe 31 PID 468 wrote to memory of 4908 468 Uvprxon.exe 31 PID 468 wrote to memory of 4908 468 Uvprxon.exe 31 PID 468 wrote to memory of 4908 468 Uvprxon.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uvprxon.exe"C:\Users\Admin\AppData\Local\Temp\Uvprxon.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 7642⤵
- Program crash
PID:4908
-