Overview
overview
7Static
static
7d62901aea4...73.exe
windows7-x64
3d62901aea4...73.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
1$R0.dll
windows10-2004-x64
1$R2/NSIS.L...4_.exe
windows7-x64
1$R2/NSIS.L...4_.exe
windows10-2004-x64
1shup.exe
windows7-x64
7shup.exe
windows10-2004-x64
7uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 12:49
Behavioral task
behavioral1
Sample
d62901aea4991466da394ee776903e73.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d62901aea4991466da394ee776903e73.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$R0.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$R0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$R2/NSIS.Library.RegTool.v2.$_4_.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$R2/NSIS.Library.RegTool.v2.$_4_.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
shup.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
shup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
uninstall.exe
-
Size
55KB
-
MD5
e0600428ea866cbfb7a5bf371fabb690
-
SHA1
e549409619b867fcfe35cfb449819319fbf61fb3
-
SHA256
55a49dd4716b9eabe09c67b12cb225708ccedc6eba08824724b7152074a686ce
-
SHA512
33a8f5d62d51d700975e50b3b99fed0973eb868d117d934cb571148a2e03f41839aebc92e3d13b2320ae1f1babbbed5536dd572e28fb78b9d50851b2f5613e45
-
SSDEEP
768:4/UpAHiGjRQ1kkjH918xnyzOp7OssT1pF/O71mJ/Bgd2iZQAm6kRRS+NoJRnKN/4:8UeHiWRgkkjH8nyWmJZgdLeAyN9VgX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2260 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral14/files/0x000b000000023181-4.dat nsis_installer_1 behavioral14/files/0x000b000000023181-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2260 4800 uninstall.exe 88 PID 4800 wrote to memory of 2260 4800 uninstall.exe 88 PID 4800 wrote to memory of 2260 4800 uninstall.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5e0600428ea866cbfb7a5bf371fabb690
SHA1e549409619b867fcfe35cfb449819319fbf61fb3
SHA25655a49dd4716b9eabe09c67b12cb225708ccedc6eba08824724b7152074a686ce
SHA51233a8f5d62d51d700975e50b3b99fed0973eb868d117d934cb571148a2e03f41839aebc92e3d13b2320ae1f1babbbed5536dd572e28fb78b9d50851b2f5613e45