Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 13:44

General

  • Target

    uninst.exe

  • Size

    70KB

  • MD5

    7f834af08bca0c9328a02c7d8d65005f

  • SHA1

    8e0a1fb04639dcdf1586eb1a29aed6cbdc6ba984

  • SHA256

    310a41c39d3ca2404beab883e50195e28704dc051d70f57705b76452b6009607

  • SHA512

    f38e2a820b918d51d43a7cb7532f5cba7209b2da49ba14e34545fc61a45e4910ac531cf8c958d6625714d0f2ea0d8c9e63e66521660f8e411d20dd8322a7e45a

  • SSDEEP

    1536:wKNLH58uyYkDHKQXJoiNYRN6QcIw6wEE6y:w+8uyHOQXJooqPwPZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.soft155.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9f73af8a76ccca0503821c32cfe399e

    SHA1

    1d3b0b8a317836ed92ae2555bc96399c80d90ce2

    SHA256

    d46503406693e9e59316afd22fa4bb49b46a06bb05242c1b079cb51ee61c0020

    SHA512

    78b126a956ac931178dd08212ad45217b9c527623dee5ed5d7ea2bcec36a8acfbb4a71e74b4c715d6df47459c980910aa5eb22e2c3becd66ac5e7574918e54fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4da064b6f7f7e8035f01b788ca8af31

    SHA1

    d51aad33d9e178ba00e24511ce74d1648f42c3d1

    SHA256

    66a068f17640ebd1811486580342fb2d294059b2e4cdfcaea888a5504ca90376

    SHA512

    e23e8500e84c866ea0f7559503754e3edca17b115c02edc23e68e0bd5ea9af145515f286f1cca52844d5ef0702d4c9bb7f03074ea4dba57f31494f1b987bbd2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efac7c440de859bdc586654d41fae3e5

    SHA1

    0a144be7ae7254747620e2722b7736f6cd3f4a93

    SHA256

    9b0e17af3476ba6618560ea61bf02b0ef6aeac2af4ef3e3e8dcc8ee58e7f3385

    SHA512

    7413653c4368baab0603a33d7c8f37acfe26014168292f3f88ba9c5185037dd654df6f2e4bb70316a2824a45cd5ce126679fed6326be5a0fb73af3640b0d9a2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a99665da560252d84c6e19bcba8f9799

    SHA1

    1298dd17ca8a5f247064eda9e705e0364e9cb4c0

    SHA256

    4c8d577eb5ac37170ddd616bc80fb5ae730578f8b956c73617f67394e274ace0

    SHA512

    252dc499cced52d84d004d4b36929d520a6c21249c7c3c8d80853958aac0fbc946ba2b33e94c9fbfac5cff164ac85780ba7855b15082d4f5f41e7e62567b3919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab0cb648b5a90a87e0c9e8135dad53cc

    SHA1

    080a2e85851a1a80f431402d5c692b5084f17de4

    SHA256

    c500e41a74df7ecc0164ec04d104b327e26be69d45d94cb92acabc228793fe4a

    SHA512

    64685a3a63994dd71109718fe4a50523d2841cf2b9a56286527e192bbf2412f966df24d7d5dcc6f1f22f4b1bdfcff3365601336f4159e9b5c0f4ba15ff70b694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e518f042be24f48c5b3305b469ef0ff7

    SHA1

    79065ff2788207e944ebce89cc8f790baa554680

    SHA256

    9f88a9b7b2afce6db1bef3d0251c8f1f04f8aeaf68a8e163bcb8130e3e60fc66

    SHA512

    d1ad76e37c26a14ee3637440905c12c25e37fa3f1805fe1439be3f4f942785f05110bfb83e29a9973b69b45359198905cd5b9d7dc62607b2835a406af83c923c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41741c157fdcdc9ee3df111a154174a4

    SHA1

    82ca472c0d06bad38305640387e9bdd71741af85

    SHA256

    651f4d2ef1d09200122caacd7a6a5f3e5ff604bf65d6a2a4e98f5cfe11a891ea

    SHA512

    92687cb52bc85a6c8a652d8b09c8deeb93d961dc7b982f8f565b2ecc235ac7e774e82a876743702a2fc2c95ab718e2d4a55962aa0b64d74f56fe90f1478814e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3d931d79e0558023dc477211f8de94f

    SHA1

    b9b2d68deb70e7b1834a53faeab8feed0448f610

    SHA256

    b809b3f9a305198bd679c2e2036e0e25fa9ba844983213c6014fa35e6bd92e00

    SHA512

    316362e336288546fc5a4266110cdf579da625720a83722094eae7e4e4fb647de6d613fae0100c19515b5da71f8dee1439993b8efa96dcb673c64b42bb51b56a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8692c5bd22750f94a4bc35a36c58c53

    SHA1

    b85236c606c27da115ad5f79f8980a58826bdf15

    SHA256

    487f528903a899a5b199da6ee085ded8d86b3ce3f1589ab1f5749482d5bde37a

    SHA512

    9bad7e8fde6785bc8ad7fc5788bf516d7996951d2599f54fd4b848418041820ca2e33879d739b71d4a1c41436fef279f3b134f5815b2aa2ce806ef38af9c09a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d515644050f41d71fd03a4b5a867dff4

    SHA1

    9af1d499e8e44b9e6dfbea822f872d66acf10838

    SHA256

    4982604c56e166200fed92d914fb185224bb128bb91f72f87187509c8d22be3a

    SHA512

    4fe8f1ae944176d18043b95ac01ece81663d671cd029b015946d21f7ee6c1fee02d7f8d51726c93902a0670ed47b2b839217163581b7f9af1d5171a29ce8b9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdd87d7f75e8fe2cb800b036dcfa7b9f

    SHA1

    d9a8d81f62f8e9539bcd8c34dd157d2ced62f156

    SHA256

    22d9ac3f679d7ec21f531a546ad5ecef2d670b68eea6067cb2f50747214b73c9

    SHA512

    42e1b3e68ca27de480c60ba2bab7a008079254b8b62f3447caec1ff8a1b054c3a22052e593724f8f997b6acaa60ac6ed074e59e12c442ac172bf095b39669167

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e478b99fc182617fd28f77958ff0d84e

    SHA1

    5e0c0509c2bfa772d83d7e0b40fa97b89ccedcf1

    SHA256

    d6b3e6461cedab6db2422a90c1aa2e6d1b044427c1e5f8516ff43fcfde0297ee

    SHA512

    a1d178ee40f6757908046c9bf4e440b080a3bd94d93cb279cd4e8a24092b76b32442ea124e52c1bdb1929541bf32799f71970d9d5adf75648d15f5071e95576c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fba16916478382bf9938cfb569a508a

    SHA1

    1a12ae1c77b4b2f255a8cdcf547e8aae417cc0ac

    SHA256

    d36f897f5211051f845ee44d196392557a3a731dff31ba0fd4015aba9c88bec6

    SHA512

    7ef46f74be59d1983371ac0b78d6ff80fba4dfdc09ce205be09a16d0ee0c4b7b6cb2c6feee2a17b6c6bb2c15e94fa6b1c5680a3d4853a5d2b733a894932cc3fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca7b442ed8c410d320edef76554e0586

    SHA1

    6f70ea75d23f91166cc47dbc2060d85427bd9781

    SHA256

    433d48f20b127c3e9eb826859dd4f87ed78ed8a322b9a10f15badc0aad159152

    SHA512

    51047384d2e4f0c340c2ab83b1596f97b2b350c1d297cdaf8fd2c7078af8037f1bf82863dc35aee0972eb934ca51849a79373b4dda04016b23fd782a74891cfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    751827b55e66c875687c19909a2288ff

    SHA1

    e3f0f46b0daa00781e228aa7d6704e3c15aa6db4

    SHA256

    e9d2130c03f00a545694941c2d2c608157ac79f139c6f6b459049831c9127f36

    SHA512

    8dd3041d65c864a7df0d1a9788d4140486521a935bee39d0e188cea8cc6e8c1d919d45308b46dd19be872550ca44824ad97746dc686098d9c8fe68b0aaa0f578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b4eb3f6ec8b2fce3ad0c41979ca0739

    SHA1

    d13cf61bc47e60fad0e45d2e765fa31b13121a95

    SHA256

    9c89f3f417ee5e7adb6e5a5bbcb178299c346bae73a31af56de585e947d10026

    SHA512

    c65753009151e14412c7d7e89401397454666c6819ed7bb7e5c2a0e56c0116d9d419c518ed59858f31032a600c428012dc723423558943d3222ba6c7de461185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3795d493fc986735cb64fa6542baf0cf

    SHA1

    4cfbe44c015a809597deba34629be6eb959cea84

    SHA256

    b51296763103362958bb46c021aa0f903ecb38c20f5b986edabaab2130f8be2d

    SHA512

    81a974282a44070027786f08c437a394e9973bd461dacd6fee5e0ab49fc3aaff44275c1a92066d97137c6ce0ae7835b8fbd680ec4b3f84917917679f661f30c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59bb9149ef79041d9443deef14f00d0a

    SHA1

    4f34206509125148aa1a6ee6293a3df5439be670

    SHA256

    596c414cf2546baf7374c11033a52fea351b380b300f2b89b3eb2656e8a32581

    SHA512

    bd876a5e682e6b72ac5be2c9701bd83f7373305e707fb3770ad3703854440dcbd3079422d44a656a0aaf079a275b99fea9265dbe707fb4fb1a45e20248efe8a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddbd8911b66f5c94d6e20483d458fe2c

    SHA1

    cb07f3538d3f788a348156ad6aba8b52837c3d34

    SHA256

    ba37825f8cc9b3894227a45a580e4fd074c00233c030be4e08cc5ad9c7cb91ba

    SHA512

    0c5c521ef87a79e0a9d5f3746da1533100d4ac64c2b24ad94c0d6fa46fa95bd753749e117694fa9c2669c1c6c9447f339ccf507847902ad1abe5ec2db2c89db9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sxsuh4u\imagestore.dat

    Filesize

    8KB

    MD5

    a37649c35df7bcc840b74abe8eed3d3e

    SHA1

    ca3066fc68c7eb56546136f85360cedc868374c9

    SHA256

    9ee922fb2b66b39f05597ca49bcd0bb2a22fb64560781851fbde6483cdef0aae

    SHA512

    e80b0950dcd951671b759ab8a3ea4c8df81fde8ac7c5c0c90713346aec42b90feef2576a48cb383b36fdbe287c66464dd228fe1202d73e40b7415cf5c13e8fc4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\favicon[1].ico

    Filesize

    7KB

    MD5

    08fb0139e6adf41c8daa4d5781bd3bf9

    SHA1

    c3402e3631daa7ffe5cc8fb70758ca16397d249e

    SHA256

    d383f96417f493626b0414711d0b2b19430d87fb1c936a99fc76216e112b38fc

    SHA512

    9902d967caaea37a2d40cfb800530cb778132db455d0fe2fd62c9e3e2636bff8ae66a33126d8246f962e006f6b3a968bd461f1b8077c504a79769130408c52dd

  • C:\Users\Admin\AppData\Local\Temp\Cab68D4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar69B5.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    70KB

    MD5

    7f834af08bca0c9328a02c7d8d65005f

    SHA1

    8e0a1fb04639dcdf1586eb1a29aed6cbdc6ba984

    SHA256

    310a41c39d3ca2404beab883e50195e28704dc051d70f57705b76452b6009607

    SHA512

    f38e2a820b918d51d43a7cb7532f5cba7209b2da49ba14e34545fc61a45e4910ac531cf8c958d6625714d0f2ea0d8c9e63e66521660f8e411d20dd8322a7e45a