Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 11:58

General

  • Target

    Uninst.exe

  • Size

    83KB

  • MD5

    bacd58ec67ab834cd1425045173935fe

  • SHA1

    496961b4619595b0d5df6ba300ff3aee5314cb0c

  • SHA256

    b4a74906780ddfb753bd7bd2fa5cb01fa19aba4510d5865c43f794bdda3ecf2c

  • SHA512

    04f723b122bee8f8540bd4a7433bef511c7dde36f6068c340e1db6641e6cb28cbd43e32035885b11e037590aa725a6770a45877d1d3578f0cb44c9884cad7408

  • SSDEEP

    1536:XLXB65939tY6HBg4sXJqcjFrzqGCCYJ9ZUVUx0AYE/1s2SXiMl5Dovxj+hi:XLk395hYXJpFnqGMJ9vaE9s2giM0vxjB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyCDCB.tmp\Processes.dll

    Filesize

    35KB

    MD5

    2cfba79d485cf441c646dd40d82490fc

    SHA1

    83e51ac1115a50986ed456bd18729653018b9619

    SHA256

    86b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7

    SHA512

    cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    83KB

    MD5

    bacd58ec67ab834cd1425045173935fe

    SHA1

    496961b4619595b0d5df6ba300ff3aee5314cb0c

    SHA256

    b4a74906780ddfb753bd7bd2fa5cb01fa19aba4510d5865c43f794bdda3ecf2c

    SHA512

    04f723b122bee8f8540bd4a7433bef511c7dde36f6068c340e1db6641e6cb28cbd43e32035885b11e037590aa725a6770a45877d1d3578f0cb44c9884cad7408