Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 17:34

General

  • Target

    Uninstall.exe

  • Size

    66KB

  • MD5

    68cd276d5a6fefdef3f36abaec4e7ff7

  • SHA1

    7cdcefd92dbedc6d858debc7b896ce052e62ddfd

  • SHA256

    d40ad7ecbaaf5b6bc8428b69c0e43afa110806263db862adac2b25166c1a95cb

  • SHA512

    647fc34083de5d2c8bb43114da402eda08167a19971437714b1774d7bd4bb37ca37640a251d5e12cbf0199d75508bf25092d9846a088128ac3c874cddea6c6df

  • SSDEEP

    1536:DuLdaekIpG1GCDPy+EiaD4y3oAYp+d5qw6Re+u5+2n:bep8PHGDUw6ReV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          66KB

          MD5

          68cd276d5a6fefdef3f36abaec4e7ff7

          SHA1

          7cdcefd92dbedc6d858debc7b896ce052e62ddfd

          SHA256

          d40ad7ecbaaf5b6bc8428b69c0e43afa110806263db862adac2b25166c1a95cb

          SHA512

          647fc34083de5d2c8bb43114da402eda08167a19971437714b1774d7bd4bb37ca37640a251d5e12cbf0199d75508bf25092d9846a088128ac3c874cddea6c6df

        • memory/1664-14-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2052-7-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB