Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
c5fc9ee2c3b69f89c1cda782705a66ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5fc9ee2c3b69f89c1cda782705a66ef.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ImpSurfB.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ImpSurfB.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Scripts/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Scripts/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
help.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
help.htm
Resource
win10v2004-20240226-en
General
-
Target
Scripts/uninstall.exe
-
Size
35KB
-
MD5
9338bdc992e5dc5f2810b944fed5a787
-
SHA1
fbe7fed5e0ee9e43e546c514e5f5cb66071e921c
-
SHA256
ba8146f34e6075018a844f97509a6469b56f16d41b45722bc12593ea3d59f1ef
-
SHA512
caf068a610df2f06e37c6d27f4aec4651cf45ac85c76fce8da8ae6c58225121e85ff26230cb7a43129bc20aa04147cb72496236c6e719a252c425936652abc08
-
SSDEEP
768:/1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ9JRnqQi4Z:NQpQ5EP0ijnRTXJQQi4Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3420 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral6/files/0x000700000002321d-4.dat nsis_installer_1 behavioral6/files/0x000700000002321d-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 3420 4504 uninstall.exe 89 PID 4504 wrote to memory of 3420 4504 uninstall.exe 89 PID 4504 wrote to memory of 3420 4504 uninstall.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scripts\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Scripts\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\Scripts\2⤵
- Executes dropped EXE
PID:3420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59338bdc992e5dc5f2810b944fed5a787
SHA1fbe7fed5e0ee9e43e546c514e5f5cb66071e921c
SHA256ba8146f34e6075018a844f97509a6469b56f16d41b45722bc12593ea3d59f1ef
SHA512caf068a610df2f06e37c6d27f4aec4651cf45ac85c76fce8da8ae6c58225121e85ff26230cb7a43129bc20aa04147cb72496236c6e719a252c425936652abc08