Analysis

  • max time kernel
    86s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 04:20

General

  • Target

    uninst.exe

  • Size

    73KB

  • MD5

    8ca236f661c9364be87efd601529ee66

  • SHA1

    b2f037f13cb9c972852c30da6666c04c8931a933

  • SHA256

    a9dceee1eb32691a84515ecbd4cca5b0c10bfb2c4dd414af8745ad6df80545d2

  • SHA512

    d30878f260f982a0713fc876beb3294cd0a326ead7bb90e58f06d91ecddaa01880b77a71b50c5ccefd64029b5abe83fd9a64185e54c26d9231af3105b57e6066

  • SSDEEP

    1536:VKRhoEXBpnbfRpQmJQg0eV6tECy3lvUyS1vg3XTsJLYKJ:MjJ7nbppQmJQpntEx1vE1vg3XTsJsKJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.552200.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6407019a53f0d83a1999b3fabadb113

    SHA1

    c0b2b0068271976c7301c052a8d8b56477cd870f

    SHA256

    d03b06007074eebb22ed7f6b6e66ef337552596524d4f36b4d7c7202ac8a1ae1

    SHA512

    25d6cc11e74b5be35771f6c59c1d4463e752005419e9b7fb16c3da3508c9293df9be1a9212318de87117a7feeb1bdfc88a75f24b61e61b054f163c8d18eceb0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7229da9f465ecad799e24bf77c447e1c

    SHA1

    1c9114d77a4f0d289bc75fa0714e12bc57d46d59

    SHA256

    8e7de9f8d14a43d731366b4495eb179c69d4b1d9faad4851c181eebbccdbba75

    SHA512

    e9eafecce5d85a69ce0a25e58794d9a554691f5a06335d2f0aa04afa114c2c00f7b612c232f42ebdc8a710f454d962f29a6ad6a523a46084bb60bd4e574e3c70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d282af4b9cfc5e5981ce603f9bc3a9f

    SHA1

    1727239e9703cc1eacedfb1ec4918b8c13e99de8

    SHA256

    199057fbb5eb701c4399c9fcc61078a43f10a642bcd0264e3704b02001d7cf93

    SHA512

    1bac0358f09fe4042d83240a5e95024f0b4ee523a07f0d320be9e1128b37bb50e63143fb78a407c41a350645fa25625f2337fae9b5af8868ebeb8601de2399a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bade9a96c0400d7eabcd25bc7d184d90

    SHA1

    46f95e173762244e632b15885937451ddc5e0acd

    SHA256

    64d7c963e81acc767e792c26c8cf89a322c70a3e4ae936e7ad68beb964145bfd

    SHA512

    11edf07dbf266b68cd08c81c29cdbce8e18c78b6f2075a4f375bbc821192cb6b6ae09692667d3187f3f3ba86e5835b8a95da57d382e2ec50df6939fb48ff9a84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9cc40797da719425ef9e9e74feab3bc

    SHA1

    2d800f24b11f3cfb66afc4958f6c2dfbf1f59d4e

    SHA256

    47eee65be65e6dffc699790fafe9a4bbae0a5e42b22d99656c5d3de1bc1a5ece

    SHA512

    c6a5247849f5f3684bb9159cee5a72af8e9d6ce84f72146a1082c47c6b4a36822f55ec4d134bf647f71d9e7b5b479a6432ea9391e8fe403ae370b3fdc873f2d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9e00c7847caf3624b8237bb79be284c

    SHA1

    6572c96ca3726aab61dc0f9cac973f43a8de2d72

    SHA256

    b68b68fd8e8026d089667e55946257bf675ef9244d4522605ca24c2420fc807c

    SHA512

    a352779756f76b8579af6bacf471c3293d123b59fbfdf955d9c2f7f3b09f728a04923fc4705d3e2f29c750b225ffb2d34cc515954664a39e8546e85a91cb454f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93193c0c22ec9a9c9c0fc918ed067fb9

    SHA1

    5b3c3f07b2260348af17fc0888fcbf237c517db6

    SHA256

    7d52be700a397f658faaeb5fc27d13d29cad7ae0c36cf29b2a469864142781b5

    SHA512

    9e1a20f2aa9bf745235ce342d08bed148c238ad0ac5dfc52650cef034283f8889dc309540d6ddffd1f6183e65be34e58e11f106f4666169ff670a493a97d03fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40e185a892881712585fd9b4870c57da

    SHA1

    ebf1901787575c4c3e44ee0ea3df46a935e9237c

    SHA256

    d4918c89f7070307d7ad5a64a20b42dc1f027571b3a9f042154c2a1f9566ffd9

    SHA512

    8761b0d9bea62dd301f7e3a23222bdb161598292ebaf90b9da3a72bf15a291f12cfa28c71cec2bc307a3b4b6547c70d6d4b82ad28695d321246b851a8b4f9c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f80ca3290158f8f8b145dac89322f48

    SHA1

    3bd95acb609e560a045db7247708f0392c8100ee

    SHA256

    463b2abef8e92d8cbbf058ce7d6fc2af7892e687e1b9cc248eed16925aa9dc83

    SHA512

    95464218bc8e4dc9e7e5fea53924017abc45cf3ead029d4a985e3ea52e64abf512413af447f6a545f066544f535590f04c01454b60d824f6cd50313697bf0131

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    859d1bfd02f750e5524db62ae54589d7

    SHA1

    0a1263d9c72f7baa22c4413637fd2682bb1b21f1

    SHA256

    6bdd37d7a6b7fcfc3992a7f30229fd8c736fd2d79bff9adc1681f65bdcd2f59c

    SHA512

    48a8d9caa80303872b06f868bc079bd33a92e9065c8c29a7f50c3da3af48c57ed486a871f753a58a4902ec077dad8a32ded4fda07b72e2ef7f1198ebd3cbc784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    314c8c8be6e6635d0031ca74bac4eeac

    SHA1

    21b332c6e92939de2733a2e69fac0a544b8b9743

    SHA256

    1d3b1753a902844c3b8bba27b71bdf73a5a0df4e21280e585a5d0d9c6b959272

    SHA512

    768603722eecdc6d0979268d72f9f9a7d5122dc8b44860eab62b9c4f77f9933db57c0c0fb4f26d977895e524133950e39d932516f4f4a95c876032d9cf9139a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1958b9cb3ca172b8844249deb9621f46

    SHA1

    eedc1f31dd08b46c3b68352d23b001eae8e09a9f

    SHA256

    caf50760e54017db38f61fe8ab551a64777c4b29ed0c789f12147c433858460c

    SHA512

    1c49ed515d9b91bca1f5385e45ce45d10ac964083a35fe25668be4da30c94be9a6adc8c4f4c703962fb6c3884443dc50885ebb65ec50c40f0688074888553938

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98c10ea7b70a0e8505940805cde6866b

    SHA1

    3088d1cadec309fcca0eccb97380f937d3961608

    SHA256

    68feaab1cf5780eaf90d4510eb2701d5ec87cfb711a5d66510f1821a22ad0055

    SHA512

    ada0a79c6a2ad39f206e66831aa044ea5010059a014646be34f8179cae453d615a18e6c8aee995f0322b956dc350871cddf47170f5c6ecbab3971b7307778b23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbbb806e20064c41b904b99116f25908

    SHA1

    5ab3305fe2b19e54d91989191cbf382ee28378c7

    SHA256

    29c9cc118335f7406d1e09a9f29b0a0744757e46966f59b54b2ec3d43fbf05e4

    SHA512

    2ae13f0ea977d97c0d488b281f97993184893ab4c2cda25dd1fb2144bc85723b056b0cbf174311fd61ded376b68053c0589aa54254c5d2506e2e2378714f61ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2cac6aae1e8910a7b754a292e8ea712

    SHA1

    12e0469402cd3123f6496fb4a8adda530ac8abc3

    SHA256

    f132b49e83d4cf921fbb69bce068f00ff90ce4ddda91feb649ee07b4b8157bf4

    SHA512

    8960ac7c6ae2944bff1a2a41127359ac75db1be7e6db27790a4eebfa238f8b4e85fabab7ca58875d8c106196a4ccc57196c4d471a34fda3ea939a01b0a3cf38c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daaf6a3fa2458eff10c642810d06a4ab

    SHA1

    8de79478ba954569869783fc62fd61ec06d2da99

    SHA256

    ba6dcb23e2080da80c9a2e134849bb28859d70de3bd31cd5cfb84310912e7ab7

    SHA512

    2741e34f0cf0057638ca4d55c56be74f0559863e8750569b52f07d4ce0d64d6a6f108cd00179393973bafedd13a27ce4230f313856e7fb8f71a1f3dd53879917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a07833bba12b15b02fc12e5aa45d8e64

    SHA1

    670ab06e7bb1eca151d39140286f6e44e3ad6d3d

    SHA256

    a9a79c81856e3ad6ea89a95e0caeb418ff49b6dcfe2627f934c1e19e6a3c4238

    SHA512

    1285a7954b7aa9151c9127201ada91048588b1dde1273dd65c96b97a782b9eac5b6881c0182d8430d29f302b973b95636dedf2c3593cee42df58b8ad1da7c0e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7576229af99fb9d684cb766fc3ebebf

    SHA1

    9e2b293dd735eb20c218ff2d5d34927974bea670

    SHA256

    ec9a1eef639231df15ca93d0de633d0df03e729e729d0d9920dab1a7b44ebbe2

    SHA512

    e8bd4512f5927cd8009f799daf8ff29df9b666281fad6a5ef7ba278ccb69bbff5fa64513d328c7062ba308fef57e19d285bdc6486688d6885f56e7a4ed2babd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    467f93e6aa220733a435c7851f6aa1d5

    SHA1

    41658e7aaaace25213545c9c28ddb1af20528c0c

    SHA256

    4ee73c8a8849a4985ac99fd0f23baa455c4d5ba96a63d5114d84c5bc63203e30

    SHA512

    bfac74d02ce21e03223da74710610f2c09539ef632d2f5b09f6f4b88e7123e16698afd8b662e942c7f97558689392cd1004cbddecbe224c898b5426b7d7418b1

  • C:\Users\Admin\AppData\Local\Temp\Cab6848.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar68F6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsk788B.tmp\FindProcDLL.dll

    Filesize

    31KB

    MD5

    83cd62eab980e3d64c131799608c8371

    SHA1

    5b57a6842a154997e31fab573c5754b358f5dd1c

    SHA256

    a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

    SHA512

    91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    73KB

    MD5

    8ca236f661c9364be87efd601529ee66

    SHA1

    b2f037f13cb9c972852c30da6666c04c8931a933

    SHA256

    a9dceee1eb32691a84515ecbd4cca5b0c10bfb2c4dd414af8745ad6df80545d2

    SHA512

    d30878f260f982a0713fc876beb3294cd0a326ead7bb90e58f06d91ecddaa01880b77a71b50c5ccefd64029b5abe83fd9a64185e54c26d9231af3105b57e6066