Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 04:24

General

  • Target

    $0/uninstall.exe

  • Size

    82KB

  • MD5

    2b9d5d67e5a787e82df93596ba8be0ad

  • SHA1

    fa073dbb88bf52e3cc202ce53b55831f1c6d33d2

  • SHA256

    8c5f4d34ecd29cccc4a8bd879911b82a58ce023c28079dccc6cc80eea3f754da

  • SHA512

    563be9fdf6c81f8f801ff93d9513ec6438f7e978c168ba39fa73830c4c298bb59ed27f033425f00699fcdccb7c4cb13ff01a733cab1f985e126fbe43298cfc52

  • SSDEEP

    1536:AEkjY1zy214Qay0DGkJ7qAELVigJ9mcptJgNfKeQ2/DRkAo:vkjAJ4dDGkJ+AI08PXJGKeH/E

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsj7254.tmp\ioSpecial.ini

    Filesize

    610B

    MD5

    16195b6a9dd1be32e8a8b791479fe66b

    SHA1

    1cfb9d53a125644022ac49aa3bab38771996012c

    SHA256

    07d9d2c9ab646e2368361de2d2e85338872c254c1d8a126602e4abb3d76e9ae6

    SHA512

    8c14fbe945e0864e54b056efd2a4986e2fc7b2097f2d5cdcd2874d5f9d0d3d03612e1193f843e90eeb35d243ed291fa46946f89d85345638ea66c64d6a6f4a82

  • C:\Users\Admin\AppData\Local\Temp\nsj7254.tmp\ioSpecial.ini

    Filesize

    623B

    MD5

    f882c1eeb25f26d9f5a67cf9bf493362

    SHA1

    156935fb2171904572e1d5d73bf4c6dbf63f4a3c

    SHA256

    c40a717dba912b81414ad28b21dd8a72e97d084b56b28c43afd5e5dc69c27b9e

    SHA512

    2ffbcb7a01fe9fd335d464ea256b6a7864af00fcf519f1da255952795daa07f6d2785f2e9f4a36f31ebe153a73557be70b25a423213b7f941e1eb8114eceb819

  • \Users\Admin\AppData\Local\Temp\nsj7254.tmp\InstallOptions.dll

    Filesize

    13KB

    MD5

    d765c492c21689e3d9d61634371fd861

    SHA1

    ac200933671ae52c9d5544d0e2e8e9144d286c83

    SHA256

    551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc

    SHA512

    9919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f

  • \Users\Admin\AppData\Local\Temp\nsj7254.tmp\System.dll

    Filesize

    10KB

    MD5

    fe24766ba314f620d57d0cf7339103c0

    SHA1

    8641545f03f03ff07485d6ec4d7b41cbb898c269

    SHA256

    802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd

    SHA512

    60d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    82KB

    MD5

    2b9d5d67e5a787e82df93596ba8be0ad

    SHA1

    fa073dbb88bf52e3cc202ce53b55831f1c6d33d2

    SHA256

    8c5f4d34ecd29cccc4a8bd879911b82a58ce023c28079dccc6cc80eea3f754da

    SHA512

    563be9fdf6c81f8f801ff93d9513ec6438f7e978c168ba39fa73830c4c298bb59ed27f033425f00699fcdccb7c4cb13ff01a733cab1f985e126fbe43298cfc52