Overview
overview
10Static
static
10KeyGen/KeyGen.exe
windows7-x64
1KeyGen/KeyGen.exe
windows10-2004-x64
1Setup.exe
windows7-x64
3Setup.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AKV.exe
windows7-x64
1AKV.exe
windows10-2004-x64
1IWM.dll
windows7-x64
3IWM.dll
windows10-2004-x64
3IWM.exe
windows7-x64
6IWM.exe
windows10-2004-x64
6IWM.dll
windows7-x64
1IWM.dll
windows10-2004-x64
1IWM.dll
windows7-x64
1IWM.dll
windows10-2004-x64
1IWM.chm
windows7-x64
1IWM.chm
windows10-2004-x64
1IWM.exe
windows7-x64
6IWM.exe
windows10-2004-x64
6Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7qs.html
windows7-x64
1qs.html
windows10-2004-x64
1安装说明.url
windows7-x64
1安装说明.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 06:18
Behavioral task
behavioral1
Sample
KeyGen/KeyGen.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
KeyGen/KeyGen.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
AKV.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
AKV.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
IWM.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
IWM.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
IWM.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
IWM.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
IWM.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
IWM.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
IWM.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
IWM.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
IWM.chm
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
IWM.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
IWM.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
IWM.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
qs.html
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
qs.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
安装说明.url
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
安装说明.url
Resource
win10v2004-20240611-en
General
-
Target
Uninstall.exe
-
Size
44KB
-
MD5
c3f1317f54f69e507c266c2c44c0d330
-
SHA1
135fcbd71ac7ce7a5d4225c06c390113f2b8ac42
-
SHA256
f5a60e2e460a4ab1bb244fbdb86ff1b7cbd4b0cc9f1851d9920edbda91cd65c0
-
SHA512
e700c6c24ef333929d953ab507511f7a407c84998fa7ecae3aaaf498564879c49cf5746f4a60df1ce6818e68ec4ca92388806b57cc475ef6391ff506e89794d2
-
SSDEEP
768:2QSYaefDRwYxmDTR9RAdJF4cZqF86eWkJ6ls4iWSjbJsa3bPv:jjae1wYxmBBoskJt4XSjbJs4L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral22/files/0x000700000002340c-5.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2300 4676 Uninstall.exe 80 PID 4676 wrote to memory of 2300 4676 Uninstall.exe 80 PID 4676 wrote to memory of 2300 4676 Uninstall.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5c3f1317f54f69e507c266c2c44c0d330
SHA1135fcbd71ac7ce7a5d4225c06c390113f2b8ac42
SHA256f5a60e2e460a4ab1bb244fbdb86ff1b7cbd4b0cc9f1851d9920edbda91cd65c0
SHA512e700c6c24ef333929d953ab507511f7a407c84998fa7ecae3aaaf498564879c49cf5746f4a60df1ce6818e68ec4ca92388806b57cc475ef6391ff506e89794d2