Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 18:11

General

  • Target

    uninst.exe

  • Size

    267KB

  • MD5

    e2f13e8ef4393261accbf1820f494b22

  • SHA1

    07ba5405f71ea82bcb8eb392172b2b8bc3a95e43

  • SHA256

    2ad2574fb0e983dfbeff433b37d53098df32a3b8bc00a7fd81289343adea2deb

  • SHA512

    62fb452417ef1f8103f7a958f9d5890024005eba3d45acbb1865388188452a34e69a30356040cc339ed110674bbe26d738959ae76e57b17196484bb08382b31b

  • SSDEEP

    6144:2e34gc+JW5JiDhEruMYzwIn57i3VeH9MJscYxvODahLt2tyuuKeRsLAo:Fm5KOZYrUCySHLr6uHsLf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsgEF81.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsgEF81.tmp\nsProcEx.dll

    Filesize

    28KB

    MD5

    5e7c9a1b92ae6b794ac01929fcf6bf5b

    SHA1

    cc7a45da00e97acdd5bdf013d460941c7a209031

    SHA256

    778f0aaeaa4d4e11228257d18fa1145a16b7af6238f3268d41830edee38f2945

    SHA512

    a6f492181d384ef3db29bf2f2db91ae2b87a64af7bdbdac8b5db72ffebe10b482775b3b09bb458e7005588e31488cdce4bd5d8c7d6b5f943c956bb9d702b13aa

  • C:\Users\Admin\AppData\Local\Temp\nsgEF81.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    8f4ac52cb2f7143f29f114add12452ad

    SHA1

    29dc25f5d69bf129d608b83821c8ec8ab8c8edb3

    SHA256

    b214d73aea95191f7363ad93cdc12b6fbd50a3a54b0aa891b3d45bc4b7b2aa04

    SHA512

    2f9e2c7450557c2b88a12d3a3b4ab999c9f2a4df0d39dcd795b307b89855387bc96fc6d4fb51de8f33de0780e08a3b15fdad43daeaf7373cca71b01d7afdaf0c

  • C:\Users\Admin\AppData\Local\Temp\nsgEF81.tmp\wizenis.dll

    Filesize

    376KB

    MD5

    c2c86a19ec4ac1195be3307f001897c2

    SHA1

    42f13dd9bdd0f3c60254c4c56af3288ebb4269c2

    SHA256

    979f1d83c60e203281120fa9829c5b83ade7b0db35e141cee1e1b475fb421990

    SHA512

    cd30d66e2ad3e09ed208eea0ef47a53ec835ee0ff0629c1d80e9a700c3d71d7ca4af0f5d8cc7046ec7519a983303a6b28cb031bb04932188a57e95bf2dc644bc

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    267KB

    MD5

    e2f13e8ef4393261accbf1820f494b22

    SHA1

    07ba5405f71ea82bcb8eb392172b2b8bc3a95e43

    SHA256

    2ad2574fb0e983dfbeff433b37d53098df32a3b8bc00a7fd81289343adea2deb

    SHA512

    62fb452417ef1f8103f7a958f9d5890024005eba3d45acbb1865388188452a34e69a30356040cc339ed110674bbe26d738959ae76e57b17196484bb08382b31b

  • memory/1512-30-0x0000000002A50000-0x0000000002AB2000-memory.dmp

    Filesize

    392KB