Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 04:14

General

  • Target

    uninstall.exe

  • Size

    40KB

  • MD5

    94a11494765adacc8241db87a903ed04

  • SHA1

    0463c4a58e13a28cb164b2188f5405b726b6a3df

  • SHA256

    6a9c8a5f939460baf43b0c4f949c3de5e8ab157713cceea4abfc2a661a432c06

  • SHA512

    4ca281910d7632d74c381cc4904acf4ea5dc8b41f743115cca82ae3a7e453a9ed1bccf1c7398865d69506d2182d1b8881c71dc64d0d28242656b755e808ffa74

  • SSDEEP

    768:6HJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJdJRnSlCXf+ZnOlbh:6pgpHzb9dZVX9fHMvG0D3XJYlCXpf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    40KB

    MD5

    94a11494765adacc8241db87a903ed04

    SHA1

    0463c4a58e13a28cb164b2188f5405b726b6a3df

    SHA256

    6a9c8a5f939460baf43b0c4f949c3de5e8ab157713cceea4abfc2a661a432c06

    SHA512

    4ca281910d7632d74c381cc4904acf4ea5dc8b41f743115cca82ae3a7e453a9ed1bccf1c7398865d69506d2182d1b8881c71dc64d0d28242656b755e808ffa74