Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2024 15:12

General

  • Target

    Uninstall_FoldingBrowser .exe

  • Size

    71KB

  • MD5

    8dd15bbaa635358aa8bb9af00cdf4e9c

  • SHA1

    62dd57c30a1950d4558ee2d7189fa2836d188098

  • SHA256

    51d1e2664649b716a8c73c314d6485b4edacec76ebe343bcfe6c0392caf2dd5d

  • SHA512

    e55095f2b562ea8ddcd7e59749805ee696c25d44845de5df816354a0c6ff0ceec6641689b3175eb25109b6ec6a33b3d16420a265ecd40581b6c84e64d3fc660f

  • SSDEEP

    1536:E1E/rzW2pakRmB7BW3nKsclgdLeAyN7Q4r7q4XdZ:E1E/rS2paccKntclceA/g7q4X3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall_FoldingBrowser .exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall_FoldingBrowser .exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst68FD.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    b26b412d9f1050ad53f663c972fdcd9f

    SHA1

    7bc4ed444f3f8fd14c2c36784d828175bace8c17

    SHA256

    70c842f318f691d92e5829616a283aa9bf9dc18cea6f39bad028e176056b591a

    SHA512

    ba350a10b41c0cfe34c502e3d0e68fbfe1489448c85a282e0a5e444fa58d0dd8be2e566e21f0734a0debfc454f08b84140964c09c4c952f6a442642c911d7b46

  • C:\Users\Admin\AppData\Local\Temp\nst68FD.tmp\System.dll

    Filesize

    11KB

    MD5

    3f176d1ee13b0d7d6bd92e1c7a0b9bae

    SHA1

    fe582246792774c2c9dd15639ffa0aca90d6fd0b

    SHA256

    fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e

    SHA512

    0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6

  • C:\Users\Admin\AppData\Local\Temp\nst68FD.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    b3070cf20db659fdfb3cb2ed38130e8d

    SHA1

    aa234b0620bebddde1414ff6b0840d883890b413

    SHA256

    f2c1409faf2952c1c91f4b5495158ef5c7d1a1db6eea4a18f163574bd52fcad0

    SHA512

    4849a4cf24ea8a26cd04eb132d479cc093d4e204ed3866a77646d03778f4c128e20722a0c3cd62ea98a37deea4ce505fe632420158c71a10b0c8c5e32b38e3f1

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    71KB

    MD5

    8dd15bbaa635358aa8bb9af00cdf4e9c

    SHA1

    62dd57c30a1950d4558ee2d7189fa2836d188098

    SHA256

    51d1e2664649b716a8c73c314d6485b4edacec76ebe343bcfe6c0392caf2dd5d

    SHA512

    e55095f2b562ea8ddcd7e59749805ee696c25d44845de5df816354a0c6ff0ceec6641689b3175eb25109b6ec6a33b3d16420a265ecd40581b6c84e64d3fc660f