Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 18:37

General

  • Target

    uninst Purity.exe

  • Size

    212KB

  • MD5

    cd3286e328c8f5a6cfc58bccfdc6b6ba

  • SHA1

    a39ff471ec081ec1a89d5511e1a87fd1c2e4462d

  • SHA256

    5869a0ebad4731751c9c21975a2861363fabd79985fe93d3c4cb3595a6da23c7

  • SHA512

    a96ca8cc6ee6e26940345bbeb2a639577322b03fa0146f24ba5fca3e7a1313c3e7911fb8a3b232dab75a958a3acbb970466979089d5fb90b05602c4b3142b53a

  • SSDEEP

    3072:XLk395hYXJewl03IT2TkMjKK1HNz0DPWFjdhdWdyWmlvJYDBW7gYN:XQqkwkI6kMBn0KFj18IYWF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst Purity.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst Purity.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:5028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsh58C0.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          325b008aec81e5aaa57096f05d4212b5

          SHA1

          27a2d89747a20305b6518438eff5b9f57f7df5c3

          SHA256

          c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

          SHA512

          18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

        • C:\Users\Admin\AppData\Local\Temp\nsh58C0.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          9384f4007c492d4fa040924f31c00166

          SHA1

          aba37faef30d7c445584c688a0b5638f5db31c7b

          SHA256

          60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

          SHA512

          68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

        • C:\Users\Admin\AppData\Local\Temp\nsh58C0.tmp\ioSpecial.ini

          Filesize

          643B

          MD5

          f1c53dffe439740957e9adff044f6d91

          SHA1

          9d9a3bf24bf5b410d36da551665a61459f11da04

          SHA256

          01e3901faeb37d382bdc988446e5627ecd4f292a077f33ac4dc26438ee3a12f6

          SHA512

          5c9459b7ebab2d5fd54ece7cf666e973ca881b295be702ef244835de89017c37acb3e2d03da1a77296c8b1cdc761f892b091bf75cda80ffd4ba9090b1fc0f196

        • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          212KB

          MD5

          cd3286e328c8f5a6cfc58bccfdc6b6ba

          SHA1

          a39ff471ec081ec1a89d5511e1a87fd1c2e4462d

          SHA256

          5869a0ebad4731751c9c21975a2861363fabd79985fe93d3c4cb3595a6da23c7

          SHA512

          a96ca8cc6ee6e26940345bbeb2a639577322b03fa0146f24ba5fca3e7a1313c3e7911fb8a3b232dab75a958a3acbb970466979089d5fb90b05602c4b3142b53a