Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 18:45

General

  • Target

    Uninstall.exe

  • Size

    126KB

  • MD5

    6313c988b270390dc13bfe5ed2f1c7a2

  • SHA1

    5722a42f8f546fd541f0041aaaff94316b1e429c

  • SHA256

    71a4a74e6d5718ce17f714896d620ee247dbc423c4400e7191c33bea50e59aaf

  • SHA512

    0cd6d2ea7c48a22a3a6797c93fc94214f818389cfb42633f6594d017adc76c9c3d553fcadab2b155472ab3b9c65095acd60ff89657086aea357969fec5e86178

  • SSDEEP

    3072:qgXdZt9P6D3XJQ4+ByBCK5RfoCfpIhCxcE6rF60qf:qe34mpByBCeRug6rFpk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsx7F72.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    eef9e469e8a30717974499f277d97e2a

    SHA1

    2d33c25984ebd9116beeb55cdde4c5c86c023e5d

    SHA256

    1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

    SHA512

    d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48

  • C:\Users\Admin\AppData\Local\Temp\nsx7F72.tmp\ioSpecial.ini

    Filesize

    586B

    MD5

    20c27b0ed5729c92b3b18ff3eddfc5ad

    SHA1

    160e987cb48ea1be20604e76fee769dda667e3aa

    SHA256

    f5adcf5fe55da53e5f0c2dd53e0e347c6f26736b7eb98fa8731ab1422c27941a

    SHA512

    e196a5c768d010f80bb8787747e331828654c0d1227eaac2572a9359ae2f798cf6af5ee2201474dbf64aee3c9ac8077e63c72eea820757b22eb4e00837f6c419

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    126KB

    MD5

    6313c988b270390dc13bfe5ed2f1c7a2

    SHA1

    5722a42f8f546fd541f0041aaaff94316b1e429c

    SHA256

    71a4a74e6d5718ce17f714896d620ee247dbc423c4400e7191c33bea50e59aaf

    SHA512

    0cd6d2ea7c48a22a3a6797c93fc94214f818389cfb42633f6594d017adc76c9c3d553fcadab2b155472ab3b9c65095acd60ff89657086aea357969fec5e86178