Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 13:29
Static task
static1
Behavioral task
behavioral1
Sample
iobituninstaller.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
iobituninstaller.exe
Resource
win10-en-20210920
General
-
Target
iobituninstaller.exe
-
Size
25.6MB
-
MD5
b727787fa4f715df94bd2575a4939609
-
SHA1
ea22275aa4205195c4f96b409524f65bc9d7fa38
-
SHA256
e72ee401fbafa974d76c5acb144a1092501b97b511ed7824e4b641c74cfb79b3
-
SHA512
f5cf8265218af35d89c6c0ddb1d6e606c9928b700b96c8bb37c1c7beda2fcef98b6eb03d231498f3e546830472373399370ad561caa1bdd98d9151eb1998a6ba
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
iobituninstaller.tmpSetup.exepid process 2684 iobituninstaller.tmp 2892 Setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exepid process 2892 Setup.exe 2892 Setup.exe 2892 Setup.exe 2892 Setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Setup.exepid process 2892 Setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
iobituninstaller.exeiobituninstaller.tmpdescription pid process target process PID 1688 wrote to memory of 2684 1688 iobituninstaller.exe iobituninstaller.tmp PID 1688 wrote to memory of 2684 1688 iobituninstaller.exe iobituninstaller.tmp PID 1688 wrote to memory of 2684 1688 iobituninstaller.exe iobituninstaller.tmp PID 2684 wrote to memory of 2892 2684 iobituninstaller.tmp Setup.exe PID 2684 wrote to memory of 2892 2684 iobituninstaller.tmp Setup.exe PID 2684 wrote to memory of 2892 2684 iobituninstaller.tmp Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\iobituninstaller.exe"C:\Users\Admin\AppData\Local\Temp\iobituninstaller.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\is-1SSMK.tmp\iobituninstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-1SSMK.tmp\iobituninstaller.tmp" /SL5="$40038,26267170,139264,C:\Users\Admin\AppData\Local\Temp\iobituninstaller.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\is-G0RHT.tmp\IUInstaller\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-G0RHT.tmp\IUInstaller\Setup.exe" /setup "C:\Users\Admin\AppData\Local\Temp\iobituninstaller.exe" "" "/Ver=11.1.0.18"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-1SSMK.tmp\iobituninstaller.tmpMD5
b25f095c085e1bc475a31d5b7e89aa21
SHA192e5e17188c4671b714bbb5e8993abe8450673ce
SHA25632df1f1ecdcfb6c620a1f563235920f026994138dc32c4e2e4a1bf84640ea1f4
SHA51230389bb0a8ab64bfb6251d225990a1d3c21267f43885479be5bae39e531d2b1ee42b9dfa780e7d95ecf7161e3931bcff337def1f8c3de0dda2794e4de009307b
-
C:\Users\Admin\AppData\Local\Temp\is-G0RHT.tmp\IUInstaller\Setup.exeMD5
3a7cffd1b470049dba90374463a1114b
SHA172124c648388ec29c62946f492b6c03a083713d4
SHA2562dd70f2c6d70456c9022728b36d3c478099b85fe9b6d7aac3deded813214952a
SHA512a6d81fac75143c29c4cecb8fdd5b647803af33b06a6a1be6678e54626a4f3f3efcad2a1eeecd627932116ea2707bfa3a52a493454a363e40d326958104d27010
-
C:\Users\Admin\AppData\Local\Temp\is-G0RHT.tmp\IUInstaller\Setup.exeMD5
3a7cffd1b470049dba90374463a1114b
SHA172124c648388ec29c62946f492b6c03a083713d4
SHA2562dd70f2c6d70456c9022728b36d3c478099b85fe9b6d7aac3deded813214952a
SHA512a6d81fac75143c29c4cecb8fdd5b647803af33b06a6a1be6678e54626a4f3f3efcad2a1eeecd627932116ea2707bfa3a52a493454a363e40d326958104d27010
-
memory/1688-119-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2684-117-0x0000000000000000-mapping.dmp
-
memory/2684-120-0x0000000000540000-0x00000000005EE000-memory.dmpFilesize
696KB
-
memory/2892-121-0x0000000000000000-mapping.dmp
-
memory/2892-124-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/2892-125-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/2892-126-0x00000000043A0000-0x00000000043A1000-memory.dmpFilesize
4KB
-
memory/2892-127-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB