Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 04:15

General

  • Target

    uninst.exe

  • Size

    980KB

  • MD5

    b6ed789b9cec1c393b13ef9865ad23dd

  • SHA1

    d1c7642119dd554792c1ab5599bbf31cd220a78f

  • SHA256

    c48d748e9a7d8b96b48246abb328d239e8ff3381f57cb16f7098a02ecb803726

  • SHA512

    05fe99d7cba47717a95f9251a5d746e3ba313ed9fd0822e3587b9f555250b11ee6ee2aaf33984fed689175bedebd9540967fed74dc77c920372a7a2b117bf43e

  • SSDEEP

    24576:xHA0XEh9sHiC5RpWE7e6MWmZFDV3UOe6o1hg:xg0Xc9sHsyeBfVlehzg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsi416F.tmp\nsDui.dll

    Filesize

    1.3MB

    MD5

    874800803e12da10f7d028d1a2bf640f

    SHA1

    b86ee59ab1efb739df6397a635d21f8787a08034

    SHA256

    7c652efcfc27057fcf7a2feaa74b69ec839a01d2f74344ca93b92f0b9288419f

    SHA512

    45dbda2c6e3a5fbba8a7cd0788928c5863e726d57724031f18080defc103e6803e40fcbdb07285bbfe973656372a5e73a42e504ad611c59eccbd8ed7422a4d47

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe

    Filesize

    980KB

    MD5

    b6ed789b9cec1c393b13ef9865ad23dd

    SHA1

    d1c7642119dd554792c1ab5599bbf31cd220a78f

    SHA256

    c48d748e9a7d8b96b48246abb328d239e8ff3381f57cb16f7098a02ecb803726

    SHA512

    05fe99d7cba47717a95f9251a5d746e3ba313ed9fd0822e3587b9f555250b11ee6ee2aaf33984fed689175bedebd9540967fed74dc77c920372a7a2b117bf43e