Overview
overview
10Static
static
3333e76fb70...0N.exe
windows7-x64
10333e76fb70...0N.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
57KB
-
MD5
8d67546632276e864ed86f26919d8e0e
-
SHA1
77ba03a00c7229618ef86fde09e83125a67f7578
-
SHA256
4dc37f2bb5ad34df5da0aa71d7938ce3638ef63e278ea117115371acc1fa7614
-
SHA512
3168b58ff1d10a79f64983889e6401fc7611161f1b79f22d77b81a8b8bce8f473169389daf323f00367147b88a8c9901bfeaf022f3527f9c759673743a20cde9
-
SSDEEP
1536:o02Wf0K2CImbrBwiALljslcUgdLeAyNxdxVpl2LCOKm:o030XCIscLlj+cUceAY/wrKm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1476 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 2916 Uninstall.exe 1476 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral9/files/0x000500000001a46d-2.dat nsis_installer_1 behavioral9/files/0x000500000001a46d-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1476 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1476 2916 Uninstall.exe 30 PID 2916 wrote to memory of 1476 2916 Uninstall.exe 30 PID 2916 wrote to memory of 1476 2916 Uninstall.exe 30 PID 2916 wrote to memory of 1476 2916 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ea60c7bd5edd6048601729bd31362c16
SHA16e6919d969eb61a141595014395b6c3f44139073
SHA2564e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39
SHA512f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993
-
Filesize
57KB
MD58d67546632276e864ed86f26919d8e0e
SHA177ba03a00c7229618ef86fde09e83125a67f7578
SHA2564dc37f2bb5ad34df5da0aa71d7938ce3638ef63e278ea117115371acc1fa7614
SHA5123168b58ff1d10a79f64983889e6401fc7611161f1b79f22d77b81a8b8bce8f473169389daf323f00367147b88a8c9901bfeaf022f3527f9c759673743a20cde9