Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 02:02

General

  • Target

    uninstall.exe

  • Size

    58KB

  • MD5

    a53a912fab731bed752d8421d7de4dd2

  • SHA1

    90289c2fa0c47350cd85ea1cb5d5e13de27f551a

  • SHA256

    960293e0cfc7f99fe7d6f90065e3712c0ebfdfb3a259e9d2758fe305aa57c61a

  • SHA512

    f9e2c3ccf04664bfd90f8d30ab35e8be64b5c6cc0b5d8d795a7d7b514a50277831637a4acbbe03113bb3c17abec9765122e3122e7c12672e278505d2d56feda6

  • SSDEEP

    1536:j1E/rzW2pakRmB7BW3nKsciPgdLeAyN0X7qgFXYtP:j1E/rS2paccKntcqceAD7vFXYtP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    58KB

    MD5

    a53a912fab731bed752d8421d7de4dd2

    SHA1

    90289c2fa0c47350cd85ea1cb5d5e13de27f551a

    SHA256

    960293e0cfc7f99fe7d6f90065e3712c0ebfdfb3a259e9d2758fe305aa57c61a

    SHA512

    f9e2c3ccf04664bfd90f8d30ab35e8be64b5c6cc0b5d8d795a7d7b514a50277831637a4acbbe03113bb3c17abec9765122e3122e7c12672e278505d2d56feda6