Overview
overview
7Static
static
3imgdksetup.exe
windows7-x64
7imgdksetup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3MSINET.dll
windows7-x64
1MSINET.dll
windows10-2004-x64
1bkDLControl.dll
windows7-x64
1bkDLControl.dll
windows10-2004-x64
1getradio.exe
windows7-x64
1getradio.exe
windows10-2004-x64
1sethui.exe
windows7-x64
1sethui.exe
windows10-2004-x64
1softup.exe
windows7-x64
1softup.exe
windows10-2004-x64
1start.exe
windows7-x64
1start.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7yfDNetMenu.dll
windows7-x64
1yfDNetMenu.dll
windows10-2004-x64
1�...��.exe
windows7-x64
1�...��.exe
windows10-2004-x64
1新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
imgdksetup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
imgdksetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
MSINET.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
MSINET.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
bkDLControl.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
bkDLControl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
getradio.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
getradio.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
sethui.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
sethui.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
softup.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
softup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
start.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
start.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
yfDNetMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
yfDNetMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
ֽԶ.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
ֽԶ.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
uninst.exe
-
Size
121KB
-
MD5
df23c033803085591282ccede2a629f9
-
SHA1
3ba7f4607d03f311b4fb43991165b1639f39ff10
-
SHA256
84b256dd6c48171e5f5b0ade266d9114c69ad820503589450a8131efd609c492
-
SHA512
7913cbf7f58a502b745c5365c88cec3073df00665c66db94885e9f8dbb8cf8dd48d07e0cf8d8bf42cbb0bbc92ce5742e30a42b1e87a12a18d900091f0c861c50
-
SSDEEP
3072:cppv5CNEhf8FH4KJJ6xy/JPizedq0ANdpeAy+:cXv5sEN8f0y/J6DBp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x000a000000023490-3.dat nsis_installer_1 behavioral18/files/0x000a000000023490-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 2664 392 uninst.exe 85 PID 392 wrote to memory of 2664 392 uninst.exe 85 PID 392 wrote to memory of 2664 392 uninst.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5df23c033803085591282ccede2a629f9
SHA13ba7f4607d03f311b4fb43991165b1639f39ff10
SHA25684b256dd6c48171e5f5b0ade266d9114c69ad820503589450a8131efd609c492
SHA5127913cbf7f58a502b745c5365c88cec3073df00665c66db94885e9f8dbb8cf8dd48d07e0cf8d8bf42cbb0bbc92ce5742e30a42b1e87a12a18d900091f0c861c50