Overview
overview
7Static
static
3a117703349...2f.exe
windows7-x64
7a117703349...2f.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3TrustFighter.exe
windows7-x64
3TrustFighter.exe
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
a1177033490c332ca7b53eb0af2b232f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a1177033490c332ca7b53eb0af2b232f.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
TrustFighter.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
TrustFighter.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240221-en
General
-
Target
uninstall.exe
-
Size
77KB
-
MD5
9732685fe4906be555cfc51c3cb28c37
-
SHA1
9a9975d1137dda9d45c89c274d6872bf4114a55a
-
SHA256
08a77713b521e2d9fd79e02600546225bf29193ebaa8f8d711819938a0deaf89
-
SHA512
bebebf56ce2e6ca5e254d57e8b52acaaf922a1b2835fd106973cdeda717a08839f2e4695915d3b1f245a36eb26d695c65aac7ffe4119a3555161c214351f4d2d
-
SSDEEP
1536:ppgpHzb9dZVX9fHMvG0D3XJpYRN6QcIsBb1u3xhf6t8aQ:jgXdZt9P6D3XJpq44ku
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1888 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x00070000000231d4-3.dat nsis_installer_1 behavioral12/files/0x00070000000231d4-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1888 2108 uninstall.exe 85 PID 2108 wrote to memory of 1888 2108 uninstall.exe 85 PID 2108 wrote to memory of 1888 2108 uninstall.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD59732685fe4906be555cfc51c3cb28c37
SHA19a9975d1137dda9d45c89c274d6872bf4114a55a
SHA25608a77713b521e2d9fd79e02600546225bf29193ebaa8f8d711819938a0deaf89
SHA512bebebf56ce2e6ca5e254d57e8b52acaaf922a1b2835fd106973cdeda717a08839f2e4695915d3b1f245a36eb26d695c65aac7ffe4119a3555161c214351f4d2d