Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 04:22

General

  • Target

    uninst.exe

  • Size

    50KB

  • MD5

    42f1c08629a14fac80cbdfed19c6b89d

  • SHA1

    50fc70606fa496948a67eebfe7cb36d8b4927b4b

  • SHA256

    244e1bcb83e8da3803c86e8117341b89035b3637dc56ff838e8a3073d968a8a1

  • SHA512

    a78b9c4772f4e5bb95b31ad989e1a978ee5346b04398202d712efebc3bcb933dcef456249b7a1e652d6a50657e317b5ebde83501e2efc0d398fd6f02802b666b

  • SSDEEP

    768:7Sup23EQCjlQRB8/ewZ1iU6nyYFxbssT/F/O71mJ5qpQDdnvKVdXYFfR3pn6xmAe:Wu4EQalMK/ewGnh0mJsyDdnvmBYBSe

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Users\Admin\AppData\Local\Temp\AgentVkontakte.exe
        "C:\Users\Admin\AppData\Local\Temp\AgentVkontakte.exe" -uninstall
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2564
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://agentvkontakte.ru/feedback.php?reason=uninstall
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5a9a559c3541402d680ea6427992bf4

    SHA1

    2aaac81c594d394d2756d21ff82903f179bc0497

    SHA256

    034e25eca97dcb21222abb4d2cb0b9aa786324cf84bf24fdf76648ef5330ee4b

    SHA512

    1d6130febce729eb3e360efde365c34cd4768a99dca6b8f5d23d01ce0129d54e7adcadc320fc7f9babac1aab9b58baad25a4da8da57ad9ff397d374231911153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cec9e30ff8415351b381e338569bb9a5

    SHA1

    9d4839c5f336e2d17f0170f1e4b9f72ebe4a141b

    SHA256

    8d0eaaceb28818897953758f27cc86de432117ad6f644b7bf601e589e699d8df

    SHA512

    ae621911b358fa6e3835956478c34b6ac7568cfead9484619980b4289913e92c82b8291dce4f42e37bc0d392e45850bc9780b7ef76349bf6984ff6a21b3b598c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ea4aaa328f58928e3c47301a142b94b

    SHA1

    9cac2a40afb2354ea83908202f6ca9aef64f029e

    SHA256

    e688cc3e2f8772b480ef1b50badfb34f93634ae8ae362338bdfe54e3340c6368

    SHA512

    6fc2f75ff200c795844c3da687d829497f9ed258e885f82cc5fcd20884479759c9aad5a5d1c98e17627d6626b92dd90171388bff92d4e6945f1c81d16322593d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa3773a651fe18f787066cfd4e984ae9

    SHA1

    b75a1116c558370458e397f42d94faa00c40e7e5

    SHA256

    e7b80b9436ed9b2a791bf29072c8f2fd7335d5ca0105e34838ee291bfb8ea9d3

    SHA512

    b2a8b2f7d08409b8292be69297f0976e2d7216bad055076471c6eee56ac76b1a3902aae52745cab66fb5a4e79b529dbe3551b3a3d758f925e2686cc3e9d76aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eea67b7724351827ef0c53da98f3d7b4

    SHA1

    a3a08838a4ba1ac195811039b263b82500bd0054

    SHA256

    8d0f8203f19f747fadb1d12e362a8be240ac8bdef8a1ebb5d4d0a9b64b14622d

    SHA512

    48373e2a5b69c9cfc7ce336d962df6e064c8f51d0c1daa51b481f763dc59e3500d7db58f72860e8abcbdf873e57bb61b650a9a9a771c578d6f09d9968e89114d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2573a73773a63bb4719aa17873d7d34

    SHA1

    d8dcfc15e6f9d1178f3f9a6dcf78d50abebb482e

    SHA256

    07cea21bf9a1ad21a14b1fa8632bbc68fe0b0135ea101633effb5b1102843fc4

    SHA512

    fa0286470d761bba1341c9c167a53a7540e9e5efd2190571349940decf4fb36de7a77a38e9e0dd7500e5e55c0ed1f53742ee1da95a5509d70d245eea6b33c6c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e75af3aa81b6f6dc84e29ba07769aae7

    SHA1

    047efd5ee48f7c4583fb9adfb2ddefa0ea2c0f32

    SHA256

    77d1818fc1bb29aaae9b6a20b770978ab1fea36ab82956956c2eeb08fe4693e5

    SHA512

    3ab7882bae7433dabc0124e60d29f7a4ecabb66bf615ca1fa8e1dcf9e9ddc00a87db9b2f762f5bb1083bba1775433c49d07953d974b7a9db99b4d9aefc9cdb38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0ce9650a3fa6a6fd72216109ffafe86

    SHA1

    d0e0fef652fe2a5eba4a647d8464a1d31a2d1301

    SHA256

    85bd2d7233a06dd74e54ef24ded9c8917e934c067f7c5c1d895f24e9c0f08fb9

    SHA512

    6f5178e409b2da9297e9f6da47e5e82fcfdc3d9a04d0427c245898a303160fb717196abef49ad4b8785c186b111ad3e2f0b6c21693ac2dd080b2d0ad77a4191f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a035d3fa096cf28447579b36c43f5c79

    SHA1

    37b000520664d9b22a7c39124fed57af23832400

    SHA256

    9e937814b7d569a658be13e29b16c6549bb45fcf0f165e947692fc8b9182a9d1

    SHA512

    8b7cf04aed7ded33ee9643f6541475c72a897e3643a2f08cb853920f2d1edba2239a8913491e636f91ab7f2c7015f1a917986e6295d66b64e950eaeb3a0ddabc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84e4f6473a3af8cf9f283233da2730ea

    SHA1

    773c101e85b51ef5f126219e54bcaef76b830568

    SHA256

    89020331fcb17c2329f219b6dc5d493839807e4c3a7edf31c919722e1101f866

    SHA512

    5ee7a32ab3682cf9add0fd541166aedef1a956548ac154afb9c959ed8012bd207503f8d16fdb2c81bfb9ab91533771f19656e37c28cd2b89e9187fe3a3fb8fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af8318087de0894dec809cd82c507b7b

    SHA1

    b04d6db07ed63b2b584fedab440f77e4455aaf85

    SHA256

    06837f67493e9438b1aa9cec45d550579d4f4c4582edb3905f84ffe3bbb0ad96

    SHA512

    4cea59f307ecd0c89ff9b0eb0359e4b6668f57ab5012b6859e37ccad52b9b9414abca7b9f534cfe2f6a3d2388fa02fd50740d220105cd7379117e9b8f1a4dce9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dd1593ce1d60887691f6ab81c555f5c

    SHA1

    7a6b06a880b6d190da24ad5309ff63405033e3f6

    SHA256

    432d78360aa085dac7543af7eeceed99d7cbd973119cbc154c24b1ee31620e74

    SHA512

    b7e27b5d4eb07cd577f461913fe0df0f2df8438d6977ed023d6d0ef1ad4b4f504ecf0092d0abbe1b81437a0370028485a03459c86af7bb0e9db3f93f0c7a4961

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26892236c1ce08b5707c7a93c2f46d1c

    SHA1

    93f03404ee32c892a51ec7dedbb668cfe4e289a8

    SHA256

    ed3181495d517f9347173d933264609f7684f93aa1336ef6cde6c1ca93523cd7

    SHA512

    281498a3123bad9845b8b42e5a64b3ac5f440920b97296da9ed9ffaac204d9b28274182f657710e8e44d9280e6b23ff742fd463c7137b763a53c9ced3223058c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d186782352d073b7270031802e797a2

    SHA1

    2261afad3b3dd78f6fdd7cbfcc5b65ae2c661cbd

    SHA256

    c67a4b2db2f50a26bda3b245004fa2a9758a12f8abde41367b41483953dd7b66

    SHA512

    ad43d78e569af0e9a77da748a443f036c014ed7073fffdca823f4932525843881580778efad813b215f0115416dda4c3b9b5dada2806b5d67654ddd862d8c31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f40562e02f721b13f206d3ae04db925c

    SHA1

    663c8384f08134cd471f4860ed3248dcd8623f6b

    SHA256

    f9fc05e27e6bc38df2311ce82d6020857e76e1732225a4d956dfd65b427ac96a

    SHA512

    39b6d6e19f3b809923105498182ce75279fa89d886bcf1690ed7bfa9a1afdad2fe8c374f2a846da59f3fe110a329cdb8e9c3b5080efb854913a04d99d6f06273

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5879abc2342e69bba0774c2ceedf6745

    SHA1

    df5fd3e72788937e27fd55004cbd920f7f74d35f

    SHA256

    4f9e3242b0a06c46c78411616edfc616156b4c3aa6132a50f2f723a9f750ea75

    SHA512

    a7e8d7477f784e6f0c99d33bcd5455ca3a221e7165af9798b5ee04c9baf3d5fe133e04efb4d8742a8e80528542657d2460ddb2b44079bd3a4de6f8b1bee1ab1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    748afcbe05f86636f28bd91c8b20c254

    SHA1

    85d9820561a43ec71f88ef99dec81ae4ea663483

    SHA256

    433bd42f154fe9a0895add7386e84e267573ebb21307d7425ccbaf775017f6b7

    SHA512

    13a04b54b9d64d30c0fffe6abfc66115e00bb2eb5bdbc44a2a82b9486277e840e1d4a965122002dbf502a748109c6538cfd7af91c4e5a17bf27d134192cd4c1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e2052f65aca1c4944b6072edd885c5d

    SHA1

    c96a6468a16c89fc4346c0b6d64de196c6101779

    SHA256

    20cfd9ed7b74673a456e6ee74049789bdee6d0b73e0a8dde353274cf053351c1

    SHA512

    1db281c8699a26d858328566242f484f44ffadce4bcc95bfc18c132ca93d4575333a8c683834bfcec198b4125dcebc86091b87e13e10fdc9d31de3c924cddaf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63fce3ff3c50fb31282e9cc8e75d2d64

    SHA1

    057bcc34bd6146b8e0df609e987b18dd15d7ee61

    SHA256

    d334805864f4d7d5bc91b8ea9fca475668921554f5e5a928905cf0c011db770a

    SHA512

    2e655586cf721e69d800c3b357875577154cdf8e331d4cb00a543b20ef058d1a03691ff8c2c4c9574e6aac5abcb6626d1796e31045b92566a6dcae0d6ff9380d

  • C:\Users\Admin\AppData\Local\Temp\CabB666.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB725.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjFA39.tmp\ioSpecial.ini

    Filesize

    540B

    MD5

    2033289007de4e3fb78623cdac635e05

    SHA1

    2cf035247431777510d9bafe8c389d51147e61b1

    SHA256

    df851b3c690dbb66db97307e9ef7519175a01d017ad7e5e47f562b7d734fb34d

    SHA512

    862f89205365193e630842b107524a3c36b90f0f5493c8f6793ad11dddb8b7af9ac06deb51ff3ae4e73f1f0e366552e3d2b252006a016ab3937809b8409629e0

  • C:\Users\Admin\AppData\Local\Temp\nsjFA39.tmp\ioSpecial.ini

    Filesize

    579B

    MD5

    5a9ae030af6449c0b7b6f1401fad604b

    SHA1

    e44d782dfd38948d45dfa6cb9fadaa00ddeb076c

    SHA256

    1158e19169c5ce41fff9ea01ba0996750cff98d0b0b1fcb2926fb06390935d82

    SHA512

    84608a5f11ec9d411db66bedea7d64ebc75f1983dc339d339edc27c7db64fd7ce3007e7227c1e1230e28d4535a923f7c63e5db9925917ee358f730ed01f15f53

  • C:\Users\Admin\AppData\Roaming\VKontakte\FriendsBase.dat

    Filesize

    19B

    MD5

    a011fc8314673f7f9a06c0dd9fad1ac8

    SHA1

    cfc01a608ae68181ef20b153d75b1b21a67bf001

    SHA256

    665ef73bcbbca1e38c20b8840c2b77d84123cd925cf01f3beead019619904919

    SHA512

    24b7aefc40213d63b28fcb938d9742f9c675c9cdbb1316b38fef0a404fa389efe117815f91ca9c07f42dd8a96b158b892597de8de945cb2e245e18c063f0a628

  • C:\Users\Admin\AppData\Roaming\VKontakte\HistoryBase.dat

    Filesize

    19B

    MD5

    1072c917396bfc79b2942345194e22ed

    SHA1

    afea54a0ff8598bbe9540782f50a36aa61151987

    SHA256

    4e67f0dee54b50e16cd6138dc260db4fe65ef5dca90a766c90dde92f02fb9b47

    SHA512

    853ae68ff31a8ec39d296acd2498c9802842209a5603e2d10c0b16e72223e8b56b61ddaa203da9fca2f0029c5644c7e85a346d89ec55798321fc8d133ad9940d

  • C:\Users\Admin\AppData\Roaming\VKontakte\MessageBase.dat

    Filesize

    19B

    MD5

    9f62600e540a5f9b987c3b10df51fce4

    SHA1

    9c4df36bb30ec21bd04b3ca02b23341883c761b0

    SHA256

    89c4ab06eba6fa969c580042c69fa3f0813be592e70bba8c767b2bb0986f145b

    SHA512

    b84926b90e39d996e623fd2d9ce88541a0dbce966348149c9fbd3ed08ef4bba210e3884717dc874e3a9384c48a14362e9b7436f42699182b4dabc50db7059a20

  • C:\Users\Admin\AppData\Roaming\VKontakte\RequestBase.dat

    Filesize

    19B

    MD5

    82ffa4080e51fdcfd8ccbc41e41af1a3

    SHA1

    53c4733409b879c5f80d8f73ea018b1e8f5c1360

    SHA256

    665e32182111fc917e6acb75ef6c62b62b519f680c8ac923b824bd76ddd7d919

    SHA512

    4ab761bfee2ad1c6992acb4cb0fff52d259072fe27cb386b1560388d1ad441ef67a418182c07e5df0f667f6628f6d524fb2296450231bca4ea86616ab9b3c0ea

  • \Users\Admin\AppData\Local\Temp\nsjFA39.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    fa5beae80dba254fb6c21b58265f5310

    SHA1

    f2f776611dbbb157b151aa744a7e0be1d4b8c079

    SHA256

    34b8a2130729064ca2f9b3b8e6f90d883d84662156b648a4eeccefefc3473269

    SHA512

    7c74b9e9f1ff0665ffd6fcf76fca462d9f4fbd7c4a215bc67b419497ef4c3cb9cede6c5b0803cabb316bc5391c4c6f0d578d36e1094b8ed326b140f8e272b538

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    50KB

    MD5

    42f1c08629a14fac80cbdfed19c6b89d

    SHA1

    50fc70606fa496948a67eebfe7cb36d8b4927b4b

    SHA256

    244e1bcb83e8da3803c86e8117341b89035b3637dc56ff838e8a3073d968a8a1

    SHA512

    a78b9c4772f4e5bb95b31ad989e1a978ee5346b04398202d712efebc3bcb933dcef456249b7a1e652d6a50657e317b5ebde83501e2efc0d398fd6f02802b666b

  • memory/2564-27-0x0000000000400000-0x0000000000766000-memory.dmp

    Filesize

    3.4MB