Analysis

  • max time kernel
    92s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 12:51

General

  • Target

    Uninstall.exe

  • Size

    67KB

  • MD5

    61949f12dcf93fd468738b693a46d600

  • SHA1

    4279e7eb250d1453be809341458244271b6f9d62

  • SHA256

    761cd3d5d2a348fff336ec07e2ca05548b37b812afa5f2bf78b14626ea034924

  • SHA512

    f2efd4618742c89023ba086917ee6f84f23262a12c16ba37aeaf43e2f1492389a9ae1098e7eea54c2098cffef22153b593eb11dc40c3c8ffcc0c6268a442137e

  • SSDEEP

    1536:UErU9XLGOA9yMHI7jsOzDcpgdLeAyN4P+TYquXJ5pse:UEre7GjyCaFvcpceA70Yq6Ge

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsrB17F.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    1c8b2b40c642e8b5a5b3ff102796fb37

    SHA1

    3245f55afac50f775eb53fd6d14abb7fe523393d

    SHA256

    8780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c

    SHA512

    4ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    67KB

    MD5

    61949f12dcf93fd468738b693a46d600

    SHA1

    4279e7eb250d1453be809341458244271b6f9d62

    SHA256

    761cd3d5d2a348fff336ec07e2ca05548b37b812afa5f2bf78b14626ea034924

    SHA512

    f2efd4618742c89023ba086917ee6f84f23262a12c16ba37aeaf43e2f1492389a9ae1098e7eea54c2098cffef22153b593eb11dc40c3c8ffcc0c6268a442137e