Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 00:06

General

  • Target

    uninst.exe

  • Size

    50KB

  • MD5

    3d1b49d41ef71a3c3cc2b326ebdffe12

  • SHA1

    54d308b0fe7b0f16b3e8ce104eb7405c11473698

  • SHA256

    9ec5f416372c0b168a756ac40d7741033019c543b19753dc5d7cfa244346b2a2

  • SHA512

    67e4247eb5553d45824ee56646776ef95397565123e6f07b504bd21112fce220ec93beb3f1e926e9b4f87c19bc416c87539f8da28bcfea1e4a0b79ef5ac3723c

  • SSDEEP

    1536:Appal05FyuC/jL052PgFEla4ZJJcCwgdLeAyN1zh:Ap8l05FyX0mpa4ZJJchceAy

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    50KB

    MD5

    3d1b49d41ef71a3c3cc2b326ebdffe12

    SHA1

    54d308b0fe7b0f16b3e8ce104eb7405c11473698

    SHA256

    9ec5f416372c0b168a756ac40d7741033019c543b19753dc5d7cfa244346b2a2

    SHA512

    67e4247eb5553d45824ee56646776ef95397565123e6f07b504bd21112fce220ec93beb3f1e926e9b4f87c19bc416c87539f8da28bcfea1e4a0b79ef5ac3723c