Overview
overview
7Static
static
3a6fc2d8611...3b.exe
windows7-x64
7a6fc2d8611...3b.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Zip.dll
windows7-x64
3$PLUGINSDIR/Zip.dll
windows10-2004-x64
3SumatraPDF.exe
windows7-x64
1SumatraPDF.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
a6fc2d8611cae0eda7fc1b53495a6b3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a6fc2d8611cae0eda7fc1b53495a6b3b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Checker.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Checker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Zip.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Zip.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
SumatraPDF.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SumatraPDF.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
uninst.exe
-
Size
39KB
-
MD5
b462f3c38bc5b56e06976a94a7c36bc7
-
SHA1
0106bf912fa9a37bb975afb00fd4ebaf7dff13cd
-
SHA256
446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
-
SHA512
f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343
-
SSDEEP
768:0Gn4o4BL/akfpI1nu0LXGS8BPfeyWMZtuHvwbtOuIYdPciuc1sJ:T4hwgonu0fJytuPwbdNcir1sJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 Un.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 Un.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x000b000000014ac0-2.dat nsis_installer_1 behavioral13/files/0x000b000000014ac0-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2212 2360 uninst.exe 28 PID 2360 wrote to memory of 2212 2360 uninst.exe 28 PID 2360 wrote to memory of 2212 2360 uninst.exe 28 PID 2360 wrote to memory of 2212 2360 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe"C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5b462f3c38bc5b56e06976a94a7c36bc7
SHA10106bf912fa9a37bb975afb00fd4ebaf7dff13cd
SHA256446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
SHA512f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343