Overview
overview
7Static
static
3tmp.exe
windows7-x64
4tmp.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...up.exe
windows7-x64
7$PLUGINSDI...up.exe
windows10-2004-x64
7$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDIR/nsDui.dll
windows7-x64
3$PLUGINSDIR/nsDui.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDI...ll.exe
windows7-x64
4$PLUGINSDI...ll.exe
windows10-2004-x64
5$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDui.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDui.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/uninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/uninstall.exe
-
Size
4.6MB
-
MD5
bf5cb794c91708f9c63487bc47502f22
-
SHA1
1c415a2905adb53fcee39b7d488979e962fdf65a
-
SHA256
c742fbcb2b6ede8188524f636b35bbfdf4cb10dee10a587f847c94330b10e740
-
SHA512
508aafa73a97cedd81dbbb45fcfb63d79bbb5ad727546bac72a1b7a0c71d125e9884d7c06f75d88720c93256ae0cd5efefa5b02285bb99e9951cd39ce5128e13
-
SSDEEP
98304:ZD8tFsKQKcUoxQbVUNF/YGxkFzfR3bXqv02NzF/wxt4tdq2:ZD8/QDKjRRLxb0s2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation uninstall.exe -
Loads dropped DLL 7 IoCs
pid Process 1832 uninstall.exe 1832 uninstall.exe 1832 uninstall.exe 1832 uninstall.exe 1832 uninstall.exe 1832 uninstall.exe 1832 uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 uninstall.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier uninstall.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 5004 1832 uninstall.exe 84 PID 1832 wrote to memory of 5004 1832 uninstall.exe 84 PID 1832 wrote to memory of 5004 1832 uninstall.exe 84 PID 5004 wrote to memory of 3692 5004 cmd.exe 86 PID 5004 wrote to memory of 3692 5004 cmd.exe 86 PID 5004 wrote to memory of 3692 5004 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"ati-Windows\",\"user_id\":\"8F3FD383\",\"events\":[{\"name\":\"Uninstall_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"US Launch App\",\"el\":\"Success\",\"install_productversion\":\"Official-ar-mutaz\",\"install_trackversion\":\"8.8.4.2\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-TGM4BTG393&api_secret=eGiGdVy9TP-vcp40T0t3QQ""2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"ati-Windows\",\"user_id\":\"8F3FD383\",\"events\":[{\"name\":\"Uninstall_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"US Launch App\",\"el\":\"Success\",\"install_productversion\":\"Official-ar-mutaz\",\"install_trackversion\":\"8.8.4.2\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-TGM4BTG393&api_secret=eGiGdVy9TP-vcp40T0t3QQ"3⤵PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD562e85098ce43cb3d5c422e49390b7071
SHA1df6722f155ce2a1379eff53a9ad1611ddecbb3bf
SHA256ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2
SHA512dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e
-
Filesize
60KB
MD5c3acee47a5ab94d9996692b44b63f49e
SHA1fe117c2d9602ab9b3d7d7e5539c91c43ffae8e91
SHA25666340abdc75b99f5a49983ac9f606ec880d8551d39ef5643f97a80e2150bbfa8
SHA5121cc6aad4c8dff4310163d1656a40fdda16901207b46b9064b481377acc00b17b3ddcc026a21a4fb2e98bb2f337a94ae36f790415deccec02699d7803de5ee92f
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
2.1MB
MD5f2897d414a50674f58a0d1aa19614a20
SHA1adced986562ed4a4e07fc92aff3d30797e2f83df
SHA256c4372100431007321e8fb3b41eef740dfe6e1c8a694bea251f9637209d76f207
SHA512a2760bcbb049e9f336802b9302115659bcae39c376ea05485fa3aa0da9bc695fc910f4c93348d4435d07b8448b6db2492dc3564ee94378be7e3b29dca5577396
-
Filesize
389KB
MD57b155439f2fe287dca54370ace90d7ea
SHA1c747c32daf2a7fd35e934a51c4b19a292ae2ca63
SHA25608d6a4106d5a49658d776b50c5f99dcc244bebd8577eee6f445df0b70f4d758e
SHA512a8f3b074d3e298f2783ea5aa3535d3ac452ac8c8c85fbd9c9b800294f91d3fc1315766cd8cd5a788b96753bc4177cf724c9c5b51067d71aef8f567d5da244d0b
-
Filesize
4.0MB
MD5f424f7752b48eaceb68734371931d33b
SHA1f791df703ea4371cab5eeaf43cbda469c4f59732
SHA256032b7876c96a9f7aed79a64291d50a5f50e8bc5d0c3e67de6b3dcb9d5173ae9c
SHA512827f06a05be24c51e068f2fc7dd47cc90dab9d1fa456526c50174369f605897c7f31e3067c366658cda02baa674781689a431eaefeaf2a54ae10a6df9599d5e1