Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 14:32

General

  • Target

    uninst.exe

  • Size

    140KB

  • MD5

    bf34f32bc60d3e52965080fff6e6a522

  • SHA1

    91bb29650bf1e5d5a7abb49dbf38536bdf91a1f7

  • SHA256

    47c9cdaa3ecc05f9e0143cdbef2cff3ba4b9009a61be7fce45c93dabd75723cf

  • SHA512

    738ab51de9d27c202cbdac038d582bff8d856abb6d4e2a338d4b3532a39ee710f244dc826d0e3f27bc32ad35f75d1846db599141571abdad0d0492a2cfa5babc

  • SSDEEP

    3072:dnPdzuK8Jdw4TMJw3uXceAbEiFaEDqsRf2+1U0HI3jixkqUusb/iCv:dnPdudwDzmbBf2spUWIvDiCv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe
    "C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2936
  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe

          Filesize

          140KB

          MD5

          bf34f32bc60d3e52965080fff6e6a522

          SHA1

          91bb29650bf1e5d5a7abb49dbf38536bdf91a1f7

          SHA256

          47c9cdaa3ecc05f9e0143cdbef2cff3ba4b9009a61be7fce45c93dabd75723cf

          SHA512

          738ab51de9d27c202cbdac038d582bff8d856abb6d4e2a338d4b3532a39ee710f244dc826d0e3f27bc32ad35f75d1846db599141571abdad0d0492a2cfa5babc

        • \Users\Admin\AppData\Local\Temp\nso2BC4.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          50016010fb0d8db2bc4cd258ceb43be5

          SHA1

          44ba95ee12e69da72478cf358c93533a9c7a01dc

          SHA256

          32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

          SHA512

          ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

        • \Users\Admin\AppData\Local\Temp\nso2BC4.tmp\UAC.dll

          Filesize

          14KB

          MD5

          adb29e6b186daa765dc750128649b63d

          SHA1

          160cbdc4cb0ac2c142d361df138c537aa7e708c9

          SHA256

          2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

          SHA512

          b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada