Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 22:38

General

  • Target

    uninstall.exe

  • Size

    66KB

  • MD5

    75c84be6edeb473e9b347c25e79e56c1

  • SHA1

    8e8194182fabd97a406ab84cf7b0a5b7eaead253

  • SHA256

    0fa917124981b68e4a70be84598653878f56914d3390f176034b53230d9ede2c

  • SHA512

    b66541b2481b0313e85f99896b94320a4984af77356a8c2c88d47dfa178d55a04716371f2b8a94b728886ab30c6d55655a99ea07329031fb7b5ac3e6793c048a

  • SSDEEP

    1536:2joUxZbE+HOI66qkryz9zI+PYXnj3WCW2EW58A4Romu/nS1s23CoV:2dxNE+Hb+eyz9zI3nj3WCW2EW5x45XAy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      PID:2620
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

      Filesize

      66KB

      MD5

      75c84be6edeb473e9b347c25e79e56c1

      SHA1

      8e8194182fabd97a406ab84cf7b0a5b7eaead253

      SHA256

      0fa917124981b68e4a70be84598653878f56914d3390f176034b53230d9ede2c

      SHA512

      b66541b2481b0313e85f99896b94320a4984af77356a8c2c88d47dfa178d55a04716371f2b8a94b728886ab30c6d55655a99ea07329031fb7b5ac3e6793c048a