Analysis

  • max time kernel
    105s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 03:48

General

  • Target

    $PROGRAMFILES/$0/Uninstall.exe

  • Size

    34KB

  • MD5

    c1f3b4477d961597fa6e7d1c04ee4e46

  • SHA1

    bcd5a43bea762e21b26d04939ac6f6a70cb6a606

  • SHA256

    e8dba38c5c9dc0ce0ee3faf5eb044ba49d61559dd349ff631e78818d98519fb7

  • SHA512

    5cc1dec6d540b75526322915b9e923b5e96d2c47076d113d635dbc57ca48477df9430362313377720712aa51e58e385a91502a49fa951260351bca7f8bc49f00

  • SSDEEP

    768:XgUpAudwtjpQaCyMRiNH/buv1dTm61pF/O71mJSC:wUiudwBp3CyM8HsWmJSC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    34KB

    MD5

    c1f3b4477d961597fa6e7d1c04ee4e46

    SHA1

    bcd5a43bea762e21b26d04939ac6f6a70cb6a606

    SHA256

    e8dba38c5c9dc0ce0ee3faf5eb044ba49d61559dd349ff631e78818d98519fb7

    SHA512

    5cc1dec6d540b75526322915b9e923b5e96d2c47076d113d635dbc57ca48477df9430362313377720712aa51e58e385a91502a49fa951260351bca7f8bc49f00