Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 22:51

General

  • Target

    uninst.exe

  • Size

    267KB

  • MD5

    9d64af408c95bf65b43e01a38b8f1402

  • SHA1

    965e3725fcf5075f4292564ea04a240cfdd8bfc0

  • SHA256

    814412530efa79ea169bd7c83be08aa0c51236762286b4632a08e1a2fe324c8e

  • SHA512

    2918dd13d60d2fc4649c412860cee6248b9e64ef0affad2280c8c28e839536bb1a422eec0a7ed7aca60a8135f81f4f6266c2358ce5501e78c345498f6eb898e0

  • SSDEEP

    6144:2e34Qiaq5M+jxgXoy3MEXBEVKFtIsHl+VwXTZkkr:3q55VgXogXG0FtX+w5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsz8612.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • \Users\Admin\AppData\Local\Temp\nsz8612.tmp\nsProcEx.dll

          Filesize

          24KB

          MD5

          0216cab025a4ea223141f66cbe14ccaf

          SHA1

          b08b563d5fd794e17208912e8237c961bca5516f

          SHA256

          c5c30c304347226e4ae6b758ba6ba0589cf1c0aee55886c4354859088bf88cf7

          SHA512

          e870aa7381e459e4114529efbfe0a354216b8e846c7c60e550749c6c625b98f8633da5e30192737a5f65de387f9497eebaf6502615cbb6fa16da5b8c5574207a

        • \Users\Admin\AppData\Local\Temp\nsz8612.tmp\nsProcess.dll

          Filesize

          4KB

          MD5

          8f4ac52cb2f7143f29f114add12452ad

          SHA1

          29dc25f5d69bf129d608b83821c8ec8ab8c8edb3

          SHA256

          b214d73aea95191f7363ad93cdc12b6fbd50a3a54b0aa891b3d45bc4b7b2aa04

          SHA512

          2f9e2c7450557c2b88a12d3a3b4ab999c9f2a4df0d39dcd795b307b89855387bc96fc6d4fb51de8f33de0780e08a3b15fdad43daeaf7373cca71b01d7afdaf0c

        • \Users\Admin\AppData\Local\Temp\nsz8612.tmp\winscrs.dll

          Filesize

          380KB

          MD5

          aba9373b88d323528199356d0e3e6ac3

          SHA1

          d409ffef8a2e9de8c02950c505d6df4e8be48048

          SHA256

          a395a9f9e744a9032635f6db7a037c446568adb673130ef442f804aef26f458d

          SHA512

          0ffad45fb8971e4e71fe8baf053d6b99e27a277269345668cdf4c0ce87093e9c779dec8682a84393a4c9a175206c25c276f86c39e76ef14ca18e837b66c340d0

        • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          267KB

          MD5

          9d64af408c95bf65b43e01a38b8f1402

          SHA1

          965e3725fcf5075f4292564ea04a240cfdd8bfc0

          SHA256

          814412530efa79ea169bd7c83be08aa0c51236762286b4632a08e1a2fe324c8e

          SHA512

          2918dd13d60d2fc4649c412860cee6248b9e64ef0affad2280c8c28e839536bb1a422eec0a7ed7aca60a8135f81f4f6266c2358ce5501e78c345498f6eb898e0

        • memory/2064-28-0x00000000025A0000-0x0000000002603000-memory.dmp

          Filesize

          396KB