Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 02:22

General

  • Target

    uninst.exe

  • Size

    70KB

  • MD5

    2a470f1554fd09f0b7c1328d697e35b1

  • SHA1

    3763d3b329e4d56f235341f4557aa422fa9fa18c

  • SHA256

    ffd39d206d7ce811a430178038fa84c141ddc56ff4f5560d7444f4487a72253c

  • SHA512

    ba1cd75d13e24ed553539a56d5d937426816ed69b34bad31d488893e6e84c5cbdc853679867815710880bf9cf45b0b9fba28e90b8a3ed06333a18cf6274762e7

  • SSDEEP

    1536:z3cpyORJLuB4P4AJJ+gdLeAyN1VKkvjfUUF7SWMttOTYZU4TT:z3c1fP4AJJ+ceAydvjfUK7hMtCF4TT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsm58D0.tmp\AlInst.dll

    Filesize

    38KB

    MD5

    1765624eb7554857f03706c4e46f874d

    SHA1

    800063960ced61c1a61ec0f1aaa5e3ed47dd98e5

    SHA256

    911fe5e87465dcfd461306dca31f8b60bf8d3be94d9fd2da2c91efc1bbc143a7

    SHA512

    7de4ae16776f9e63a29de1427a6a8779ab6e32a2bc9254aae93da27164c698bc314cb7fcce8b6966a5145ea4404fbcea33f2671dc862c46260fe9f6fd24d366c

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    70KB

    MD5

    2a470f1554fd09f0b7c1328d697e35b1

    SHA1

    3763d3b329e4d56f235341f4557aa422fa9fa18c

    SHA256

    ffd39d206d7ce811a430178038fa84c141ddc56ff4f5560d7444f4487a72253c

    SHA512

    ba1cd75d13e24ed553539a56d5d937426816ed69b34bad31d488893e6e84c5cbdc853679867815710880bf9cf45b0b9fba28e90b8a3ed06333a18cf6274762e7

  • memory/4012-14-0x0000000007E10000-0x0000000007E74000-memory.dmp

    Filesize

    400KB