Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 23:34

General

  • Target

    Uninstall.exe

  • Size

    51KB

  • MD5

    006d6d8b606e66a547866fa7e67fc809

  • SHA1

    14c1616880cdc4298aa093cf8dcec8b25a8442f2

  • SHA256

    0b27dc552c06608edd450c89865f1728fa0d37daec77c6b56094de1de96452dd

  • SHA512

    57f85b1ca1a2f3f91ba4b68a1f383367436b9f30698ef56dbd8c16718bac328075e1d3bcee064716b9c2b8bf72b8ffc67ac7559cf77a2d1a7f223e97e62b30ff

  • SSDEEP

    768:P4wO7XBz+5Qm3W0tYdrQZHV4EWuWEUOg4jjfS3XJ+lwlKhqc5rQ9NCC1Vhb0uip7:wLXB65939tY6HBg4sXJJlQGl1VhbGEd2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nse9EC1.tmp\UAC.dll

    Filesize

    13KB

    MD5

    7f56c0d6a8733dec142814ed5a58b0ee

    SHA1

    c119e66f179cfb758966f3cf878466057bea1840

    SHA256

    86445396775370aff5834f10bda25e505b6f89efc69a04fe1ce46f5d128be73f

    SHA512

    8b3b9bed985b3583b7be8b2197bb068e5d5508f8b5c4a7fc1278b2662dc8d9a53fd6df63f636e44bfc5aa37f030ac76b8d259d6b446bf87d5c72b74ff5b158f3

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    51KB

    MD5

    006d6d8b606e66a547866fa7e67fc809

    SHA1

    14c1616880cdc4298aa093cf8dcec8b25a8442f2

    SHA256

    0b27dc552c06608edd450c89865f1728fa0d37daec77c6b56094de1de96452dd

    SHA512

    57f85b1ca1a2f3f91ba4b68a1f383367436b9f30698ef56dbd8c16718bac328075e1d3bcee064716b9c2b8bf72b8ffc67ac7559cf77a2d1a7f223e97e62b30ff