Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 11:04

General

  • Target

    $OUTDIR/uninstall.exe

  • Size

    123KB

  • MD5

    ce2f18f0b8be2966d5c59d55be4b0054

  • SHA1

    bb5a4f9ea6b5cccd9a925ab5d5d3d1c6e308ed88

  • SHA256

    3b95720e40d10cce5fad6e94633b5bea659186a4bed042ef414cd353ec0044ae

  • SHA512

    f3b3821e845475b9ba67bab30413ea849bc174894dcb3ad3f7a270bf0525577442d5ecd5e5d90cac39fa4d211ab125cc388df982575a4d5c3faaa580f98d2949

  • SSDEEP

    1536:uUeHiWRgkkjH8nyWmJ7qkSZZZ3EORDUibMJMF2OC8bt6nZsfwOBeOm+k6TvDqVCm:ud/vyWmJBUXRDBbpC8bknZ7OCUTvDqIm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$OUTDIR\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\$OUTDIR\uninstall.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$OUTDIR\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    123KB

    MD5

    ce2f18f0b8be2966d5c59d55be4b0054

    SHA1

    bb5a4f9ea6b5cccd9a925ab5d5d3d1c6e308ed88

    SHA256

    3b95720e40d10cce5fad6e94633b5bea659186a4bed042ef414cd353ec0044ae

    SHA512

    f3b3821e845475b9ba67bab30413ea849bc174894dcb3ad3f7a270bf0525577442d5ecd5e5d90cac39fa4d211ab125cc388df982575a4d5c3faaa580f98d2949

  • \Users\Admin\AppData\Local\Temp\nsj981D.tmp\UAC.dll

    Filesize

    14KB

    MD5

    b7d7324f2128531c9777d837516b65a6

    SHA1

    e15e44fc7c907329e1cd3985e8666b4332f4fa48

    SHA256

    530dc2b26366fc86072487438317a5723a10ff8b38522f9e813df19146a31033

    SHA512

    829fc241cd377de094faf80bb38828c3d877170ca4a3fd85810bc911d2ce38941f8067ef681c21d8bbc04be8a99a3d32b3aec51ae7b32d3a89e5a9d9597ed8d5

  • \Users\Admin\AppData\Local\Temp\nsj981D.tmp\mIRC.dll

    Filesize

    30KB

    MD5

    8423ec692d326f92dfa7db57f977d315

    SHA1

    65fd701692fab6dfe24ba0fa2b29e474b6f5da56

    SHA256

    0d1218f43e2b5b0d4e052918b5193e7e050bb9f0a9bfc39f7395276b8399b50e

    SHA512

    fbb0f057dc192362584efbbb5e0c9c6fa56584580b3190aba83017905a50b9b3f54aa535281eac34f4a07538a4ddee822d974cb512b4afe28e15b504376102fd