Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 06:00

General

  • Target

    Launcher_Uninstaller.exe

  • Size

    54KB

  • MD5

    0e3e1b90738f47718bd62e4435c71f28

  • SHA1

    80d7ac590226605924462ea203469b4a463a2fa0

  • SHA256

    9fe696bc8e3a797421a866c2f3284436f89d91622e4a4de060b346035952d20b

  • SHA512

    135a2dd542d5a12b9317144730c0a795e81b8abd40f4d418c07812fe178fa183747bf2d0db290b95f48eb51da5c778255db1c10177dbc9d7ad5691210e150e6f

  • SSDEEP

    1536:ipgpHzb9dZVX9fHMvG0D3XJ9gdLeAyNxI7f2U:ggXdZt9P6D3XJ9ceAv7OU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher_Uninstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher_Uninstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy2D39.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    54KB

    MD5

    0e3e1b90738f47718bd62e4435c71f28

    SHA1

    80d7ac590226605924462ea203469b4a463a2fa0

    SHA256

    9fe696bc8e3a797421a866c2f3284436f89d91622e4a4de060b346035952d20b

    SHA512

    135a2dd542d5a12b9317144730c0a795e81b8abd40f4d418c07812fe178fa183747bf2d0db290b95f48eb51da5c778255db1c10177dbc9d7ad5691210e150e6f