Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 13:23

General

  • Target

    uninst.exe

  • Size

    2.0MB

  • MD5

    a1f1a7f656916cf47867458b72f23393

  • SHA1

    495867c9e79be12f9e08c7a3736d4bc760a82532

  • SHA256

    aec4dcf83d1a3ff01f6f457ed5a200d8b719ac7f6fe132e48ac6bb31fa94202f

  • SHA512

    ff3dd4d91d66070e16f08e81682cb3627095de4ae03a1445d4eecb499ad5765d8bed0befaf0182db4c9e2929624e7bae94145596004c56808112d109ad0d4ac1

  • SSDEEP

    6144:3e34+vH+A2Q98lVxWEUtVOgHnh+Fhb8XFJo9huri/iuSDJxiG/UqM+SSG4DYz64W:cH+jQZG/izD9/RVDYz64Wj0fK1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\SkinBtn.dll

    Filesize

    4KB

    MD5

    e4ec95271ff1bcebab49bdfed6817a22

    SHA1

    2c03e97f4773aea80ecdb98a1482e5896fe4677b

    SHA256

    ee1c06692a757473737b0ebdef16f77b63afac864d0890022d905e4873737dd6

    SHA512

    771a527133806307a1b17b7e956d6a3c16e9bc675bf084b43204ae784a057dac2726dbf90645692876043a4e7365ba8825c167621fde4760c79cd84679e2aa3d

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\SkinProgress.dll

    Filesize

    4KB

    MD5

    cc037c4703d3ec257efeef2ce0a1a20e

    SHA1

    b3d6cc8f687a31fb2c1a5921a38de9429af20502

    SHA256

    888b32ecbc37ce67d4edc28d894cba0a4f4e2488cfc2212d1af011bd0bfe97ff

    SHA512

    120bfa0a68775bef04c1863023b0e73a41982284fb36da7f497fbb7d5ed8631ad02fa09951424d339f6fefaa90a17c12f949dd68bb33bad64b1b7cace489d2a7

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\WndProc.dll

    Filesize

    3KB

    MD5

    f0cb331dd4bd92a6ebce45e7cd1cf5ef

    SHA1

    b66ea0c10b08750295f2dc7c170b370402393214

    SHA256

    e7b3115fa2ce4a8fa09beeefa4fb634a474197f38a2854ce9be60d0a26016458

    SHA512

    7c33418f39b91ae0d4cc8b560f516bac293593eef539832815028878c2058bf1691c2d767a039cf312989839071f2f6f0b6d9d59835acdfff6b448bf1ffea271

  • \Users\Admin\AppData\Local\Temp\nso250F.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    c10e04dd4ad4277d5adc951bb331c777

    SHA1

    b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

    SHA256

    e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

    SHA512

    853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    2.0MB

    MD5

    a1f1a7f656916cf47867458b72f23393

    SHA1

    495867c9e79be12f9e08c7a3736d4bc760a82532

    SHA256

    aec4dcf83d1a3ff01f6f457ed5a200d8b719ac7f6fe132e48ac6bb31fa94202f

    SHA512

    ff3dd4d91d66070e16f08e81682cb3627095de4ae03a1445d4eecb499ad5765d8bed0befaf0182db4c9e2929624e7bae94145596004c56808112d109ad0d4ac1

  • memory/1160-37-0x00000000007C1000-0x00000000007C2000-memory.dmp

    Filesize

    4KB

  • memory/1160-36-0x00000000007C0000-0x00000000007C3000-memory.dmp

    Filesize

    12KB

  • memory/1160-35-0x00000000007C1000-0x00000000007C2000-memory.dmp

    Filesize

    4KB

  • memory/1160-34-0x00000000007C0000-0x00000000007C3000-memory.dmp

    Filesize

    12KB

  • memory/1160-65-0x00000000007C1000-0x00000000007C2000-memory.dmp

    Filesize

    4KB