Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 23:14

General

  • Target

    Uninstall.exe

  • Size

    525KB

  • MD5

    65d89fc8960a5d095097c849a93a5efe

  • SHA1

    c3a35b02acc9922f4a26b52fb46221c2e1e4aa3a

  • SHA256

    0325caae308d73fc6f7b3e3a3de21fcdc4ffd18e76230ae8ee8928a56999b6ca

  • SHA512

    57f0a192b7ade1e33ce0ff33948aa99a6fb4d9b5b25caea0d82d67b2e6d2c620d8c96cc69f7b9699f5f95ecd893138529556685953ff0a70777d874688697bd0

  • SSDEEP

    6144:xmR3kSaZW678d2aYd/RnEysweS9tvy7ETDzeFgR:xI3zIPpptfvzeu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsvD458.tmp\UserInfo.dll

    Filesize

    6KB

    MD5

    7f780de67db61a924bebc0cafaded3ad

    SHA1

    3ac359dce08ceff16e4214fe45d83fdc8e3f2e1a

    SHA256

    9931a2f8bb44b92ff26062b99cbb6e41ed1cfad65079dec5d6d9c006223bd121

    SHA512

    8378f04b6f5085e887ed46874414e5681f0ecb6889dbaa25eb78f75112d4be603aef8dec6a2a81857a19978f6ccf07d65d566ff3f0943da809de22599ffdd8f2

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    525KB

    MD5

    65d89fc8960a5d095097c849a93a5efe

    SHA1

    c3a35b02acc9922f4a26b52fb46221c2e1e4aa3a

    SHA256

    0325caae308d73fc6f7b3e3a3de21fcdc4ffd18e76230ae8ee8928a56999b6ca

    SHA512

    57f0a192b7ade1e33ce0ff33948aa99a6fb4d9b5b25caea0d82d67b2e6d2c620d8c96cc69f7b9699f5f95ecd893138529556685953ff0a70777d874688697bd0

  • memory/4068-4-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB

  • memory/4108-17-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB