Analysis

  • max time kernel
    144s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 20:51

General

  • Target

    Uninstall.exe

  • Size

    74KB

  • MD5

    b93c0ef37e7aef661be8a56a12e3b790

  • SHA1

    ed7afcb83c257fc07a6bcf5f3a30eb4262029b56

  • SHA256

    01205e35be12e92f5806d3a00a40cd1f39057825e00eae19957d7dc4e0048d86

  • SHA512

    1d373ed0dff4174ece37a84d6c45f75d6503032bcf610581e822f269e118630580afadb504f13d2924d95c3a9bd54cb1650f6727dab645ac3070e1f8d981b717

  • SSDEEP

    1536:czj4loW/INYCgJc0JJ3+zR5NiOelaut2N0aPggO3dUwb4J:czjQFJbJJ3+z14aY20aggudUg8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3920
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsl2E7F.tmp\System.dll

      Filesize

      11KB

      MD5

      00a0194c20ee912257df53bfe258ee4a

      SHA1

      d7b4e319bc5119024690dc8230b9cc919b1b86b2

      SHA256

      dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

      SHA512

      3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

    • C:\Users\Admin\AppData\Local\Temp\nsl2E7F.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      ab73c0c2a23f913eabdc4cb24b75cbad

      SHA1

      6569d2863d54c88dcf57c843fc310f6d9571a41e

      SHA256

      3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457

      SHA512

      99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8

    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

      Filesize

      74KB

      MD5

      b93c0ef37e7aef661be8a56a12e3b790

      SHA1

      ed7afcb83c257fc07a6bcf5f3a30eb4262029b56

      SHA256

      01205e35be12e92f5806d3a00a40cd1f39057825e00eae19957d7dc4e0048d86

      SHA512

      1d373ed0dff4174ece37a84d6c45f75d6503032bcf610581e822f269e118630580afadb504f13d2924d95c3a9bd54cb1650f6727dab645ac3070e1f8d981b717