Overview
overview
7Static
static
3846ac24b00...5c.exe
windows7-x64
7846ac24b00...5c.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3True2Scan.exe
windows7-x64
6True2Scan.exe
windows10-2004-x64
6True2ScanCL.dll
windows7-x64
3True2ScanCL.dll
windows10-2004-x64
3True2ScanCore.dll
windows7-x64
3True2ScanCore.dll
windows10-2004-x64
3True2ScanLaunch.exe
windows7-x64
3True2ScanLaunch.exe
windows10-2004-x64
7True2ScanUp.exe
windows7-x64
1True2ScanUp.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-01-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
846ac24b003c6d468a833bff58db5f5c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
846ac24b003c6d468a833bff58db5f5c.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
True2Scan.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
True2Scan.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
True2ScanCL.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
True2ScanCL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
True2ScanCore.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
True2ScanCore.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
True2ScanLaunch.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
True2ScanLaunch.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
True2ScanUp.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
True2ScanUp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20231215-en
General
-
Target
uninst.exe
-
Size
50KB
-
MD5
4e480465798d180c4aaa22c370d2afce
-
SHA1
24a8ea7ee3370f0cc0860aa62af521b2a0df51b6
-
SHA256
c2c330ca281db344bc7f2cff55563bfc7993fcb440f3489a5b4a1981f46bd758
-
SHA512
e17eb327f1be48cd0180c10275e795f3a1ea746598ba1d3b1c64eb6739ca474bbaef66ece0c3794497c2d029c0ea3f3baf27e3899d8bc897c9ececbbbfae7f15
-
SSDEEP
768:91cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJD3eOzwhPHPe0l8:LQpQ5EP0ijnRTXJD3eOsNHPP8
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
Au_.exepid process 2116 Au_.exe -
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 2116 Au_.exe -
Loads dropped DLL 7 IoCs
Processes:
uninst.exeAu_.exepid process 1696 uninst.exe 2116 Au_.exe 2116 Au_.exe 2116 Au_.exe 2116 Au_.exe 2116 Au_.exe 2116 Au_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
True2Scan.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\True2Scan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\True2ScanLaunch.exe" True2Scan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Au_.exepid process 2116 Au_.exe 2116 Au_.exe 2116 Au_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Au_.exepid process 2116 Au_.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
True2Scan.exeAu_.exedescription pid process Token: SeRestorePrivilege 2540 True2Scan.exe Token: SeBackupPrivilege 2540 True2Scan.exe Token: SeRestorePrivilege 2116 Au_.exe Token: SeBackupPrivilege 2116 Au_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
True2Scan.exepid process 2540 True2Scan.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
uninst.exeAu_.exedescription pid process target process PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 1696 wrote to memory of 2116 1696 uninst.exe Au_.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe PID 2116 wrote to memory of 2540 2116 Au_.exe True2Scan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\True2Scan.exe"C:\Users\Admin\AppData\Local\Temp\True2Scan.exe" /uninstall3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD599f345cf51b6c3c317d20a81acb11012
SHA1b3d0355f527c536ea14a8ff51741c8739d66f727
SHA256c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93
SHA512937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef
-
Filesize
50KB
MD54e480465798d180c4aaa22c370d2afce
SHA124a8ea7ee3370f0cc0860aa62af521b2a0df51b6
SHA256c2c330ca281db344bc7f2cff55563bfc7993fcb440f3489a5b4a1981f46bd758
SHA512e17eb327f1be48cd0180c10275e795f3a1ea746598ba1d3b1c64eb6739ca474bbaef66ece0c3794497c2d029c0ea3f3baf27e3899d8bc897c9ececbbbfae7f15