Overview
overview
7Static
static
3a5bdc87d80...d4.exe
windows7-x64
7a5bdc87d80...d4.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/sepulcher.dll
windows7-x64
1$TEMP/sepulcher.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
a5bdc87d809ec95ac5116727b79c3f5c4cdfc89d8a08aee9259d5f124e140dd4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a5bdc87d809ec95ac5116727b79c3f5c4cdfc89d8a08aee9259d5f124e140dd4.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$TEMP/sepulcher.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$TEMP/sepulcher.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uninst.exe
Resource
win10v2004-20240508-en
General
-
Target
uninst.exe
-
Size
48KB
-
MD5
a6aa583c54db1d002164883147d22094
-
SHA1
a917124e61bd4e2e1b0dcada235051644b7bc58d
-
SHA256
a86fd888cc84a98b1c54d0e593ab1e56a7b213dccf0cee144f334a6729f640d7
-
SHA512
8d2b6ec88cf641c99a80d3ddfb64c3bc37cd48afe77a7bc8a8d76bfa7ba71a008042039e4c07a9c485b8f315060e1bd8defc75bdc50776c71fc323ef7d4d1118
-
SSDEEP
1536:74lVqauhF/NXcLUv8OFal8JBXJeUHgdLeAyNliW9LV:74lVWhF/NXkUuOJBXJJHceA5W9LV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1760 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral9/files/0x0039000000016c9c-2.dat nsis_installer_1 behavioral9/files/0x0039000000016c9c-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28 PID 1760 wrote to memory of 2416 1760 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5a6aa583c54db1d002164883147d22094
SHA1a917124e61bd4e2e1b0dcada235051644b7bc58d
SHA256a86fd888cc84a98b1c54d0e593ab1e56a7b213dccf0cee144f334a6729f640d7
SHA5128d2b6ec88cf641c99a80d3ddfb64c3bc37cd48afe77a7bc8a8d76bfa7ba71a008042039e4c07a9c485b8f315060e1bd8defc75bdc50776c71fc323ef7d4d1118