Resubmissions
04/04/2024, 10:25
240404-mf9csada39 1004/04/2024, 10:18
240404-mcec8scc31 1002/04/2024, 03:00
240402-dhm3wsfb76 1002/04/2024, 02:52
240402-dc3w6aee8s 1031/05/2022, 01:49
220531-b8vjjseeep 10Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Uninstall.exe
Resource
win7-20240221-en
General
-
Target
Uninstall.exe
-
Size
63KB
-
MD5
cb3b3be0acb6ba0ddd7741c01353373a
-
SHA1
d83315632dc46870e62cef1911e4bfca03ccda47
-
SHA256
26cd22712726a4379a4c2c31f3ed368c28d1992bd31990430fc7f540b62f667c
-
SHA512
8bdc39ed2138c5cf740d0da07f30149ef8d6de6144abc8408b2af83c1c2ede1034742c9d94fb69f8425d0e8fe7c604ec38b0fa5c4d033b636f21c991210abbd1
-
SSDEEP
1536:6Tdm9B9lYypfMXvugHQ0DbLiNuCPYXnj3WCW2EW58A4Romu/1kqbWUt:64lLpkXGED3iNuTnj3WCW2EW5x45VgWW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 Uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2860 2208 Uninstall.exe 28 PID 2208 wrote to memory of 2860 2208 Uninstall.exe 28 PID 2208 wrote to memory of 2860 2208 Uninstall.exe 28 PID 2208 wrote to memory of 2860 2208 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5cb3b3be0acb6ba0ddd7741c01353373a
SHA1d83315632dc46870e62cef1911e4bfca03ccda47
SHA25626cd22712726a4379a4c2c31f3ed368c28d1992bd31990430fc7f540b62f667c
SHA5128bdc39ed2138c5cf740d0da07f30149ef8d6de6144abc8408b2af83c1c2ede1034742c9d94fb69f8425d0e8fe7c604ec38b0fa5c4d033b636f21c991210abbd1