Analysis

  • max time kernel
    138s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 13:06

General

  • Target

    Uninstall.exe

  • Size

    49KB

  • MD5

    fb6a6c919f4ca52e4cfc4c0e9ce73c2a

  • SHA1

    d22aa88b73273ac7afe7e53533021cee6627e4e5

  • SHA256

    61915345a9bed206b70da47bf4078e2e298132fa301c3bb5e11ad6a432dabef2

  • SHA512

    98b15cc055ed4df92b9143382ad5cccf6edcaa29c44f63ea385ee3e98d8fb8765d5f05fc31c2d015364834db2797203f569186782594dbb21cfbca539d94d334

  • SSDEEP

    768:Mw0D3T2XQW0dcyngqR8lWFYCPMfjABHD2tAJb5PAAIYHLLE8J3+eJRn5Am6kRRJL:Mw0DsT0zikYCPMUxDRbw8JuqAELVigB1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe
      "C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    49KB

    MD5

    fb6a6c919f4ca52e4cfc4c0e9ce73c2a

    SHA1

    d22aa88b73273ac7afe7e53533021cee6627e4e5

    SHA256

    61915345a9bed206b70da47bf4078e2e298132fa301c3bb5e11ad6a432dabef2

    SHA512

    98b15cc055ed4df92b9143382ad5cccf6edcaa29c44f63ea385ee3e98d8fb8765d5f05fc31c2d015364834db2797203f569186782594dbb21cfbca539d94d334