Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
0e926b28fc49f6259a70c032ae83cd14.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e926b28fc49f6259a70c032ae83cd14.exe
Resource
win10v2004-20241007-en
General
-
Target
0e926b28fc49f6259a70c032ae83cd14.exe
-
Size
26KB
-
MD5
0e926b28fc49f6259a70c032ae83cd14
-
SHA1
abb5856b3853cfe4ecc5e25ff1a7aa605afac007
-
SHA256
3088b0302d4b38c63ef4fead57aa6049da2cc62bf9f4a5d9331552c84fe516e6
-
SHA512
1f4306c38e6604f3945a4d1215576ee81514c34757318035d9220fb81da5bb4f39d23b8a22f404902fe3e67f0326a1f9ff45dc6ce8d3a41a69aab54de488fb77
-
SSDEEP
384:BvV0KF7OERZOTPx3hd/N7az/bCKQIRB1F7M9ekamfrqEjDEFCFUa0gW71JBr:B9LZOTPxNG5z7uTqVCFUa0gWR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation UUSIService.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 0e926b28fc49f6259a70c032ae83cd14.exe -
Drops startup file 64 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_5bf039bb7c5b4271a094d383e9282b00.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_895263a02aaf4a82a78d0393e442bbd3.lnk 0e926b28fc49f6259a70c032ae83cd14.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c64387b1029548acb692029ff7abf554.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c585bb1861ad4daea480f1a77aa3bd2a.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_e1f41889713a4d53a70a4d8c6f9b557a.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_40112fcb2f4e487d948b809766ca8c7f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_a04f6b1fe95540f9811efdd7bda835d0.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_a1130dda90bf4c799c53bc68f0c851ef.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_3018ee5e9bff4c62b5191b3f7ad41efb.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_021f134de3944772b764d7a7b08bd534.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_5e795261c95742d79140ad6e1501f207.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_b73053dc8bb94d19b8c38a2febbbf98f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_f29357759c524e20971db881fc5da77b.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_999d95468af54371bd581020b69bab4d.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_bc3966127a2a44c79f3e93df6bfe2ceb.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_4e7f0135e6fd4117ab05d0b61843203e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_3d3a8903c27041318cb6613d7fed7302.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_5a15c39c865e47d8bad20d9873ec2728.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c09b268ee58c4d26808aed33f1d4a26a.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_d85452d9715c4776a6cc8d46587554e7.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_297d42c0362244f6aff8dc4360a78358.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_64cc429efba7442bb18ccbf843a3b805.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_08c62c2d1b53436c84b6133f5932f788.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_56dbf5a0a5f846df8a1da30f00b76526.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_443b07e5fbd649a48a7068cd009ee5ca.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ef55adec01bb4fd5b951cac7e0c75b04.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_1a128402683a44cbaa97348ab2cee738.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_76087f76f977459e837dfb702e4e479a.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_8f3d115f840d4a2fa7e031149914b608.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_123eab85dd904831a18d1c1bb26fd22e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c76f9d80eddb4983a8b813ea4f541996.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_866083b95baa4d24bca5c8244b6ee7dc.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ed582da6d6bb49c499446df009c4ce91.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_49d5663d70fa4c2fa2e3b5d97f132d46.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_480e31deb8d24550b0e2818db1d89530.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_33f978b4816347ba8390905df4644f68.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_17f18cedb3d240698c4c9f56e20b9aa0.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_6cb97887591143e5895f21f0b003cf8f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_8f86c3b1c9aa48ee9472a7bdccc77b75.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_b6528e0e1c804c288c3f5110356ef3ed.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_bbf16e8e33764e3ca6f3b36542365f95.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_56de6fb51a2d489596263d9ace50780b.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c1b27bc352e146c883b7b8ba4e7a7ff5.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_43203d9d000348db8032afdd7f342a0f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_68057f2e568d4a42a11b155a995bd666.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_f987be131ea4424ea828ecc531de89ac.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_20e558a1e6fa4b6394b26f5fe3c49a2f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_0408c363479240b4b4379433ec6c69a3.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_68e3e0546ea54e4d91ab928320136eac.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_5d45d1e3ee9c4a638b8eec1e35f98f87.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_bd31ad11412d4463a75e2dac5e773d65.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ece0cdcc7c50428493c226c1434459de.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ae74215ea4224adbab4157bbdef35a1d.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_febd73f844534eda99159837e61c5820.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_3887a0d32433435b8fed9478bf35d01c.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_23de8129bc5146479be73e8015204213.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_720ccf6fedfe450f9f0ee238133ec571.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_eca3ec7ea0914006be2cb2e4fb59ba66.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_6acacce33e924d0798e82e6ec80b75c5.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9dd6a187270b4ad3876e62f607240500.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_d9877959fb544c3b80674b3ce2626e57.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_cea353905d984fc9907be82de5fb1fa6.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_61bbf85bb59e4574ba46be02c2394501.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_87182c38953549739eaed2d146415c70.lnk UUSIService.exe -
Executes dropped EXE 3 IoCs
pid Process 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2652 033db632e4dd4c9380f23732483f4bed.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4655389e6aaa417a965e5ffe4801a08c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_a38a4f5189664fd39b40e08223236eb2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_02b1a0de599247129e84f2b4d772760d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_25172872aa3445e7864155cfa9d3e2ee = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_2532f1bfa08d4a58bdea3e6d084e7347 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e4a9d51ddb144185a0a23b4dcf92d27c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_6c2a5137f9f448a4a9e38ba734f9f012 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_bd898120bfea47eb8872facc61bba8fe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_b9305817c5674e4aa65e9ddf36674160 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e1491691cffc4f35b13811383ab07413 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_bd6be2b2ac094e65bdc85a3732f52f62 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_d33d352b513544579096e2bb39981137 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_6d10e2a75d72488c966a647cf05449de = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4addbcf40b66430fa62146ccccf8c524 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ceb9217ecd7342d6929e4d2eb9987ce4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_33245b552fac43b39f31e3efdf91dbda = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_84dc7a0f33ea4165b18de36e551c4c11 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e39ca33a140349d6a5659506fbf6c40d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3a144f7bf304413da5474657cdd6c8ae = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_266f647398834879b773c40192ef56b0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_70f1895bf7884a8a95e3c144c715ad8c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5ebee344606b4eb7af0bf0fbbe5ce6aa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1cd27f731218484ca73a7dc40bcca8cd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_bcdd8ea957f64ca3b888cbabe762bc6e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ebc7f8965fb34a3a964d20a50e2c5553 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_7e22ae2fc6424d7da17e557cc5655528 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_82e8a1de2cab4e31980f1bf40c2cdf26 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3424c3a203714465987d3aa59e4d99fb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ea6e587327034a6295c7e3f8a592d5c8 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_fbbdd2dedb9549a5b21c50f20580d65a = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_97f91e942d0641209bf678d9d49b05ef = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_cfc31cf0a7494203bf16d5795334f79b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_cd46845118a749c7b7e4b91906216fcc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_7a31eb422f274216a52fc857ebc34660 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_d27b1fa07a574feabe62dcc3e32534a3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4f5b39b58ed0494c90ac8366aaafc9d6 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\EdgeUpdaters.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_c33be2caacd848b886f9718dcdf27988 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_008e91095d114e17802b5ab8f198277d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5289a163b3864972acd9f7e5936b30d6 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_883d16fedca540b1843d50f1ddf418cb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_43a09e83476d42be8f771bde57b29b75 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_d175ca19e67b40ee8170f83c808915ca = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_b019501ec0654c458fb5489fabdecbfb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5a90f600f1d84b46a9aa8a72130d74c1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_cf99e863ef1a49cc95653759d4536ae7 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_be2cb90f0ccf4e269fef4186601b3f6a = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_10e92e292e2b40e3bf301e41ad84abd1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5123167351674daea4877114fc5672e6 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_be4f61fb69b34f2483e2b07d41f73248 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3ebd85aa17ec41289e68172de3a801d8 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1f6fe543b4074d1fbace12c8e76dbae9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_fdf312de4354426392039e2194a4a8c9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3247ce3b5bd846a59b9a5240185e50bc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_8629ed516bc146a7b592f7ea5ea45a18 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_113231d7cb6d41699128b0770d390427 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_be9f711f35bc4e5ab5680d2526702595 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3b093d22d9aa40f78d61149504ef86e6 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_86bb5df0a5a246f6955ad9b26010fb97 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_326f8060483f4712b4be5921cc46fe4b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_bb1dbf20416f42369c1b93296f0234a1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_f3961f7107e84281920fabc754b54d2d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4ce2e5f5189e41ca88226b53c7e47b31 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_66c153ca8e814d2d908f61fbbc780e6b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_b59d7edfbd7d4f5a9ed69d36682e4189 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UUSIService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EdgeUpdaters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 033db632e4dd4c9380f23732483f4bed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e926b28fc49f6259a70c032ae83cd14.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 2652 033db632e4dd4c9380f23732483f4bed.exe 2652 033db632e4dd4c9380f23732483f4bed.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe 4348 EdgeUpdaters.exe 2464 UUSIService.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2464 UUSIService.exe Token: SeDebugPrivilege 4348 EdgeUpdaters.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2464 3672 0e926b28fc49f6259a70c032ae83cd14.exe 86 PID 3672 wrote to memory of 2464 3672 0e926b28fc49f6259a70c032ae83cd14.exe 86 PID 3672 wrote to memory of 2464 3672 0e926b28fc49f6259a70c032ae83cd14.exe 86 PID 2464 wrote to memory of 4348 2464 UUSIService.exe 87 PID 2464 wrote to memory of 4348 2464 UUSIService.exe 87 PID 2464 wrote to memory of 4348 2464 UUSIService.exe 87 PID 2464 wrote to memory of 2652 2464 UUSIService.exe 88 PID 2464 wrote to memory of 2652 2464 UUSIService.exe 88 PID 2464 wrote to memory of 2652 2464 UUSIService.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e926b28fc49f6259a70c032ae83cd14.exe"C:\Users\Admin\AppData\Local\Temp\0e926b28fc49f6259a70c032ae83cd14.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\UUSIService.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\UUSIService.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\EdgeUpdaters.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\EdgeUpdaters.exe" --checker3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\033db632e4dd4c9380f23732483f4bed.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\033db632e4dd4c9380f23732483f4bed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.6MB
MD554e6bcf9be550a5b8e5cd7b83318942d
SHA10c9084c04d5dd833867a60376c0809e8276fd869
SHA256b5eaf10fcee125295402478e086f6e3c441024daec47dde0170ba528525f1eb2
SHA512afed87e898d00a146c42f4c81b86fe5c243c205fabb3296d757915bc427bfa8fe91d7cad48a4d36f427168b90011d8ce05e8b3003ccf47f0a3e3ab5151eefd1f
-
Filesize
26KB
MD50e926b28fc49f6259a70c032ae83cd14
SHA1abb5856b3853cfe4ecc5e25ff1a7aa605afac007
SHA2563088b0302d4b38c63ef4fead57aa6049da2cc62bf9f4a5d9331552c84fe516e6
SHA5121f4306c38e6604f3945a4d1215576ee81514c34757318035d9220fb81da5bb4f39d23b8a22f404902fe3e67f0326a1f9ff45dc6ce8d3a41a69aab54de488fb77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_895263a02aaf4a82a78d0393e442bbd3.lnk
Filesize1KB
MD5a20526301a64efc40827c25e779c1061
SHA18324d06289ec931a26c024a891aaa8d61400562b
SHA256f0bddbcbd6bc6d2a2e1bdd746426a20011b19e2abff938c9ee60c9027f4cd170
SHA51299e7c3a217950bc2081b226985b361efd069ee34f81c972280e2fd473c7b2d97e7a5092a1d50e277f9d7166f3a620b7386ca2b00a98c40ad5986636f089f738a