Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:34

General

  • Target

    Uninstall.exe

  • Size

    97KB

  • MD5

    cccc2861df1e815479010c83d00a4a07

  • SHA1

    db249055eee9b57b4693058e261464db9b875b15

  • SHA256

    90accc2cf4599bd756359242d94ecf81e44b0c19320c816f091f1a7ba381490f

  • SHA512

    3a0bcf9a94912f3c84c816cd3ad68403de812f8f2fc1bbe353921cf9de62788eebf46fcb378098d4e3fecea81a4804e2000c262215ae4692524f2e9d038c7581

  • SSDEEP

    3072:bBkfJpRXATwMdFCcyceAApIbxXTdxp7ZMsycG:bqjIMmAG57ZMsw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz39AE.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    acbda33dd5700c122e2fe48e3d4351fd

    SHA1

    2c154baf7c64052ee712b7cdf9c36b7697dd3fc8

    SHA256

    943b33829f9013e4d361482a5c8981ba20a7155c78691dbe02a8f8cd2a02efa0

    SHA512

    d090adf65a74ac5b910b18bb67e989714335e7b4778cd771cff154d7186351a1bebbc7103cca849bdfa2709c991947ffff6c1d8fdf16a74f4dfb614bce3ff6fd

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    97KB

    MD5

    cccc2861df1e815479010c83d00a4a07

    SHA1

    db249055eee9b57b4693058e261464db9b875b15

    SHA256

    90accc2cf4599bd756359242d94ecf81e44b0c19320c816f091f1a7ba381490f

    SHA512

    3a0bcf9a94912f3c84c816cd3ad68403de812f8f2fc1bbe353921cf9de62788eebf46fcb378098d4e3fecea81a4804e2000c262215ae4692524f2e9d038c7581