Overview
overview
7Static
static
3a31944ff5c...a1.exe
windows7-x64
7a31944ff5c...a1.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...cs.dll
windows7-x64
1$TEMPLATES...cs.dll
windows10-2004-x64
1KKJDock.exe
windows7-x64
3KKJDock.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a31944ff5c7531ecddbf45ac0d864ea1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a31944ff5c7531ecddbf45ac0d864ea1.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
$TEMPLATES/statistics.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMPLATES/statistics.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
KKJDock.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
KKJDock.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20240221-en
General
-
Target
uninst.exe
-
Size
38KB
-
MD5
0e63a9277a56a8561a75342dd051d7d0
-
SHA1
bc0a5ade3b8a6484058a9f6b5686b96f86396658
-
SHA256
843c80a07e3cda86fb6e772cbf6ed28fe5e9bac4fa4eb305ecae08bf4e1e2fb1
-
SHA512
aa90d7b2eff6426cf923cc2ad025e3cb48ab64398d003288d03718bf12496de575897ab8a3e91f93ecb2706a9c474d5181232448739d33950e984a576c07bbf5
-
SSDEEP
768:qPH4rKS4GDkQBZ3ImWlTtEIRlJ+qFZ2bSgJzANqM3wJJNnRvOXv+:qf4exGDkeZ4mOoSgJEAJJho2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1584 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1584 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2352 uninst.exe 1584 Au_.exe 1584 Au_.exe 1584 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x000c000000014228-2.dat nsis_installer_1 behavioral13/files/0x000c000000014228-2.dat nsis_installer_2 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1584 Au_.exe Token: SeBackupPrivilege 1584 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28 PID 2352 wrote to memory of 1584 2352 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD50e63a9277a56a8561a75342dd051d7d0
SHA1bc0a5ade3b8a6484058a9f6b5686b96f86396658
SHA256843c80a07e3cda86fb6e772cbf6ed28fe5e9bac4fa4eb305ecae08bf4e1e2fb1
SHA512aa90d7b2eff6426cf923cc2ad025e3cb48ab64398d003288d03718bf12496de575897ab8a3e91f93ecb2706a9c474d5181232448739d33950e984a576c07bbf5