Overview
overview
10Static
static
10�...��.exe
windows7-x64
3�...��.exe
windows10-2004-x64
3$PLUGINSDI...on.exe
windows7-x64
7$PLUGINSDI...on.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AutoPower.exe
windows7-x64
10AutoPower.exe
windows10-2004-x64
10Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1RunDLL.dll
windows7-x64
1RunDLL.dll
windows10-2004-x64
3SASHOOK.dll
windows7-x64
3SASHOOK.dll
windows10-2004-x64
3autoss.exe
windows7-x64
10autoss.exe
windows10-2004-x64
10disktop.exe
windows7-x64
1disktop.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 13:55
Behavioral task
behavioral1
Sample
ܿػ(Auto Power On)v3.2ƽ.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ܿػ(Auto Power On)v3.2ƽ.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
AutoPower.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
AutoPower.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Help.chm
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
RunDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
RunDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
SASHOOK.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SASHOOK.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
autoss.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
autoss.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
disktop.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
disktop.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240508-en
General
-
Target
uninst.exe
-
Size
88KB
-
MD5
bbc83c95d7a2a93b0f3a24e471f9bfde
-
SHA1
dff793da5932c33e39b031441149333a9fdb3577
-
SHA256
46380642a474308abd141b21e4b42b05725da9a6a7be8e33dd5e232f8c7bca32
-
SHA512
4b2fac36e5bf79694bba6f484f0b87a2fd697151845169fcd19b12c88c7fe834470df21c607e5e2e8ce1add3f69b782ea495e68802ff9da11ea37f0a38beeec5
-
SSDEEP
1536:FpgpHzb9dZVX9fHMvG0D3XJHgfn5GdujLoHWAEYnt3zM1m:3gXdZt9P6D3XJHCnAEo2APV
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
Au_.exepid process 3060 Au_.exe -
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 3060 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
uninst.exedescription pid process target process PID 4812 wrote to memory of 3060 4812 uninst.exe Au_.exe PID 4812 wrote to memory of 3060 4812 uninst.exe Au_.exe PID 4812 wrote to memory of 3060 4812 uninst.exe Au_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exeFilesize
88KB
MD5bbc83c95d7a2a93b0f3a24e471f9bfde
SHA1dff793da5932c33e39b031441149333a9fdb3577
SHA25646380642a474308abd141b21e4b42b05725da9a6a7be8e33dd5e232f8c7bca32
SHA5124b2fac36e5bf79694bba6f484f0b87a2fd697151845169fcd19b12c88c7fe834470df21c607e5e2e8ce1add3f69b782ea495e68802ff9da11ea37f0a38beeec5