Overview
overview
7Static
static
38c6f1ac547...0N.exe
windows7-x64
38c6f1ac547...0N.exe
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PROGRAMFI...ll.exe
windows7-x64
7$PROGRAMFI...ll.exe
windows10-2004-x64
7cmtrtxpwv.exe
windows7-x64
3cmtrtxpwv.exe
windows10-2004-x64
7imex.bat
windows7-x64
7imex.bat
windows10-2004-x64
3Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
8c6f1ac547840ebdb190013853277ff0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c6f1ac547840ebdb190013853277ff0N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PROGRAMFILES/$0/Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PROGRAMFILES/$0/Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
cmtrtxpwv.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
cmtrtxpwv.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
imex.bat
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
imex.bat
Resource
win10v2004-20240704-en
General
-
Target
$PROGRAMFILES/$0/Uninstall.exe
-
Size
34KB
-
MD5
c1f3b4477d961597fa6e7d1c04ee4e46
-
SHA1
bcd5a43bea762e21b26d04939ac6f6a70cb6a606
-
SHA256
e8dba38c5c9dc0ce0ee3faf5eb044ba49d61559dd349ff631e78818d98519fb7
-
SHA512
5cc1dec6d540b75526322915b9e923b5e96d2c47076d113d635dbc57ca48477df9430362313377720712aa51e58e385a91502a49fa951260351bca7f8bc49f00
-
SSDEEP
768:XgUpAudwtjpQaCyMRiNH/buv1dTm61pF/O71mJSC:wUiudwBp3CyM8HsWmJSC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4688 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4688 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral8/files/0x0007000000023480-4.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4688 3144 Uninstall.exe 84 PID 3144 wrote to memory of 4688 3144 Uninstall.exe 84 PID 3144 wrote to memory of 4688 3144 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5c1f3b4477d961597fa6e7d1c04ee4e46
SHA1bcd5a43bea762e21b26d04939ac6f6a70cb6a606
SHA256e8dba38c5c9dc0ce0ee3faf5eb044ba49d61559dd349ff631e78818d98519fb7
SHA5125cc1dec6d540b75526322915b9e923b5e96d2c47076d113d635dbc57ca48477df9430362313377720712aa51e58e385a91502a49fa951260351bca7f8bc49f00