Overview
overview
7Static
static
352c4541734...0N.exe
windows7-x64
752c4541734...0N.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3get.cmd
windows7-x64
1get.cmd
windows10-2004-x64
3ls.cmd
windows7-x64
1ls.cmd
windows10-2004-x64
1split.cmd
windows7-x64
1split.cmd
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7zAnsi.exe
windows7-x64
1zAnsi.exe
windows10-2004-x64
3zBck.exe
windows7-x64
3zBck.exe
windows10-2004-x64
3zBeg.exe
windows7-x64
1zBeg.exe
windows10-2004-x64
3zBoxbackup.exe
windows7-x64
3zBoxbackup.exe
windows10-2004-x64
3zByteSwap.exe
windows7-x64
1zByteSwap.exe
windows10-2004-x64
3zClock.exe
windows7-x64
3zClock.exe
windows10-2004-x64
3zComp.exe
windows7-x64
1zComp.exe
windows10-2004-x64
3zDelTree.exe
windows7-x64
1zDelTree.exe
windows10-2004-x64
3zDir.exe
windows7-x64
1zDir.exe
windows10-2004-x64
3zDirSync.exe
windows7-x64
3zDirSync.exe
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
52c45417346ec66003be870876e5aed0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
52c45417346ec66003be870876e5aed0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
get.cmd
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
get.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ls.cmd
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
ls.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
split.cmd
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
split.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zAnsi.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
zAnsi.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
zBck.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
zBck.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
zBeg.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
zBeg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
zBoxbackup.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
zBoxbackup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
zByteSwap.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
zByteSwap.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
zClock.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
zClock.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
zComp.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
zComp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
zDelTree.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
zDelTree.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
zDir.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
zDir.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
zDirSync.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
zDirSync.exe
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
57KB
-
MD5
dc3cfff7c7e83cb04970882158856c40
-
SHA1
589a2b20c0995f79f7a3d58adfe58ae9de9e8f89
-
SHA256
fdc085c4dc228fd0edb1c510190b6ada7cdc3b9abcd85d1f35d0de8650ddde68
-
SHA512
8984375674245bb91f54f2926d00544cf155f218bd0e9fe6a2218f22f0a050f3a992436f16c69b66effa6e2c718a77cc64aeda343cf3d077d926fc6d06acac5f
-
SSDEEP
768:nb4s6pIH65JbQRY63LVCIvFAUKWO95EnNz0D3VFS6sWkJYJRn1zgsA8ahRn3d19S:bjLaMv3xnCwNz0DxkJE+jhRZQEw54md
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3104 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral12/files/0x000800000002346a-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3104 1840 uninst.exe 85 PID 1840 wrote to memory of 3104 1840 uninst.exe 85 PID 1840 wrote to memory of 3104 1840 uninst.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5dc3cfff7c7e83cb04970882158856c40
SHA1589a2b20c0995f79f7a3d58adfe58ae9de9e8f89
SHA256fdc085c4dc228fd0edb1c510190b6ada7cdc3b9abcd85d1f35d0de8650ddde68
SHA5128984375674245bb91f54f2926d00544cf155f218bd0e9fe6a2218f22f0a050f3a992436f16c69b66effa6e2c718a77cc64aeda343cf3d077d926fc6d06acac5f