Analysis

  • max time kernel
    137s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 06:12

General

  • Target

    uninst.exe

  • Size

    55KB

  • MD5

    3df27c497a8e36ba8da1fbe16d08c617

  • SHA1

    eeba54b50da6c9e68e97327c8760f4bc3343485d

  • SHA256

    a3cfb3fa37649c409e04023fcc0cf9c9d12ac69bd102294b966905ee850d1efd

  • SHA512

    9fc28adfb87427f15f566790f7ef182190a03f2430721120fe628b4f5f5fe63fd1785f6c09f63494f911eb16d7228e37ca17c87d113a48196e66399b47eaead7

  • SSDEEP

    1536:YsLMFdHBBdKCpq4kJY6M+t7XoGt/L8VFMdmB2DW:YsLMFjLKoq4kJYKZ5LUv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4308
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2904,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=1416 /prefetch:8
    1⤵
      PID:4048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nszEA32.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      dbab668ce84d6b38824ed1c9b9121adb

      SHA1

      de8c80d7b0d01fafb750b2bded1f055d102aa3d0

      SHA256

      ede19cf9613ccbf2f4c731f6eb1460efe56484e97c8a0745a2a5460571e64f11

      SHA512

      5857680db3b642f14742ad55a3349cbe059c18c5dc58ae0def53886df5eb2c9abf5e444db1bc8449db779c33e940f8f2c4a7520ad8f374b9f2f01e57d6a2c953

    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

      Filesize

      55KB

      MD5

      3df27c497a8e36ba8da1fbe16d08c617

      SHA1

      eeba54b50da6c9e68e97327c8760f4bc3343485d

      SHA256

      a3cfb3fa37649c409e04023fcc0cf9c9d12ac69bd102294b966905ee850d1efd

      SHA512

      9fc28adfb87427f15f566790f7ef182190a03f2430721120fe628b4f5f5fe63fd1785f6c09f63494f911eb16d7228e37ca17c87d113a48196e66399b47eaead7