Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2024 12:29

General

  • Target

    uninst.exe

  • Size

    50KB

  • MD5

    4e480465798d180c4aaa22c370d2afce

  • SHA1

    24a8ea7ee3370f0cc0860aa62af521b2a0df51b6

  • SHA256

    c2c330ca281db344bc7f2cff55563bfc7993fcb440f3489a5b4a1981f46bd758

  • SHA512

    e17eb327f1be48cd0180c10275e795f3a1ea746598ba1d3b1c64eb6739ca474bbaef66ece0c3794497c2d029c0ea3f3baf27e3899d8bc897c9ececbbbfae7f15

  • SSDEEP

    768:91cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJD3eOzwhPHPe0l8:LQpQ5EP0ijnRTXJD3eOsNHPP8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\True2Scan.exe
        "C:\Users\Admin\AppData\Local\Temp\True2Scan.exe" /uninstall
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsj6A69.tmp\KillProcDLL.dll

    Filesize

    4KB

    MD5

    99f345cf51b6c3c317d20a81acb11012

    SHA1

    b3d0355f527c536ea14a8ff51741c8739d66f727

    SHA256

    c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

    SHA512

    937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    50KB

    MD5

    4e480465798d180c4aaa22c370d2afce

    SHA1

    24a8ea7ee3370f0cc0860aa62af521b2a0df51b6

    SHA256

    c2c330ca281db344bc7f2cff55563bfc7993fcb440f3489a5b4a1981f46bd758

    SHA512

    e17eb327f1be48cd0180c10275e795f3a1ea746598ba1d3b1c64eb6739ca474bbaef66ece0c3794497c2d029c0ea3f3baf27e3899d8bc897c9ececbbbfae7f15

  • memory/2116-16-0x0000000010000000-0x0000000010003000-memory.dmp

    Filesize

    12KB

  • memory/2116-21-0x0000000010000000-0x0000000010003000-memory.dmp

    Filesize

    12KB

  • memory/2540-26-0x0000000000230000-0x0000000000269000-memory.dmp

    Filesize

    228KB