Overview
overview
7Static
static
3f6caff6dde...0N.exe
windows7-x64
7f6caff6dde...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstaller.exe
windows7-x64
7Uninstaller.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
f6caff6dde5a009b625bd534f040b010N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6caff6dde5a009b625bd534f040b010N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstaller.exe
-
Size
305KB
-
MD5
5720fbc0b3c3205c8cf3169f980d67cc
-
SHA1
3c4fc259ec1d8639ededf8fecb42e2102b0d9494
-
SHA256
0742bc98df75f443c6a436ad9385a8a3bd8f123d42277a72ab30ae1fee1da64f
-
SHA512
3f2e95c271483fe3291456550526121fdc10ca303a32b328d74cf30d19406e3ea61ba718c2fcfbf811d219e4d51f73327c35600cd35c0ddf452d564c7b73d043
-
SSDEEP
6144:IQ3K5EnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2D:M6nM3D0Fw/tN8dkmLtpHHHrh7m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2100 Uninstaller.exe 2744 Au_.exe 2744 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x00080000000173f1-2.dat nsis_installer_1 behavioral11/files/0x00080000000173f1-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2744 2100 Uninstaller.exe 31 PID 2100 wrote to memory of 2744 2100 Uninstaller.exe 31 PID 2100 wrote to memory of 2744 2100 Uninstaller.exe 31 PID 2100 wrote to memory of 2744 2100 Uninstaller.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba
-
Filesize
305KB
MD55720fbc0b3c3205c8cf3169f980d67cc
SHA13c4fc259ec1d8639ededf8fecb42e2102b0d9494
SHA2560742bc98df75f443c6a436ad9385a8a3bd8f123d42277a72ab30ae1fee1da64f
SHA5123f2e95c271483fe3291456550526121fdc10ca303a32b328d74cf30d19406e3ea61ba718c2fcfbf811d219e4d51f73327c35600cd35c0ddf452d564c7b73d043