Analysis

  • max time kernel
    141s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 14:11

General

  • Target

    Uninstall.exe

  • Size

    286KB

  • MD5

    270c678cab012cf11edd8e06121252a2

  • SHA1

    357e61172b618924820ed59791b9b39fe4c817de

  • SHA256

    50fd9280f4a0febbdff4a9243996532a8e99670b904e6f291180f5bdc3064b49

  • SHA512

    b558549b9ab51bbe53898fad2349b2d2519a2c1aa92a376c18c1171591f25c2d69be61f0ca43c285e09e667b32da14a15b87981cf7db2a077b7dfff3fc6a1b12

  • SSDEEP

    3072:08UWylM4JDVPYuTBfcv/yFBVBmFQgUeT692unIZNKzawspXd/VBhr2m1K:+lHXRtcn8qXmADKW7Xd/VB8

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsrB0E2.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    109b201717ab5ef9b5628a9f3efef36f

    SHA1

    98db1f0cc5f110438a02015b722778af84d50ea7

    SHA256

    20e642707ef82852bcf153254cb94b629b93ee89a8e8a03f838eef6cbb493319

    SHA512

    174e241863294c12d0705c9d2de92f177eb8f3d91125b183d8d4899c89b9a202a4c7a81e0a541029a4e52513eee98029196a4c3b8663b479e69116347e5de5b4

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    286KB

    MD5

    270c678cab012cf11edd8e06121252a2

    SHA1

    357e61172b618924820ed59791b9b39fe4c817de

    SHA256

    50fd9280f4a0febbdff4a9243996532a8e99670b904e6f291180f5bdc3064b49

    SHA512

    b558549b9ab51bbe53898fad2349b2d2519a2c1aa92a376c18c1171591f25c2d69be61f0ca43c285e09e667b32da14a15b87981cf7db2a077b7dfff3fc6a1b12