Overview
overview
7Static
static
3bda3e2ec81...0N.exe
windows7-x64
7bda3e2ec81...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstaller.exe
windows7-x64
7Uninstaller.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
bda3e2ec81dfd40cb93ae1c3f78404f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bda3e2ec81dfd40cb93ae1c3f78404f0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
7za.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Uninstaller.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstaller.exe
-
Size
305KB
-
MD5
7912c369d891f08a154b923e60b3575e
-
SHA1
ff14a3dbfe7b142a2c2cc318fa076baa35ef2e7e
-
SHA256
0216a610a1a678e2fcf6f17e492dc72c48fe458ad5de4e26e2a1e4b4380a72a6
-
SHA512
ba92a21f7497a4f46ac1a4bfee224321e6f70a56455472f2ea509006ffc77072b0d99362e3c9ea6bb1f5e2c31db24c6f751f890a51c0063af8165abd31e9bd4f
-
SSDEEP
6144:7Q343nM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2:93nM3D0Fw/tN8dkmLtpHHHrh7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2076 Au_.exe 2076 Au_.exe 2076 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x000a000000023494-3.dat nsis_installer_1 behavioral12/files/0x000a000000023494-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2076 1032 Uninstaller.exe 84 PID 1032 wrote to memory of 2076 1032 Uninstaller.exe 84 PID 1032 wrote to memory of 2076 1032 Uninstaller.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba
-
Filesize
305KB
MD57912c369d891f08a154b923e60b3575e
SHA1ff14a3dbfe7b142a2c2cc318fa076baa35ef2e7e
SHA2560216a610a1a678e2fcf6f17e492dc72c48fe458ad5de4e26e2a1e4b4380a72a6
SHA512ba92a21f7497a4f46ac1a4bfee224321e6f70a56455472f2ea509006ffc77072b0d99362e3c9ea6bb1f5e2c31db24c6f751f890a51c0063af8165abd31e9bd4f