Overview
overview
7Static
static
3disk_recov...up.exe
windows7-x64
7disk_recov...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3BlackShark.exe
windows7-x64
1BlackShark.exe
windows10-2004-x64
3Disk Recov...rd.exe
windows7-x64
7Disk Recov...rd.exe
windows10-2004-x64
7FLUSH.exe
windows7-x64
FLUSH.exe
windows10-2004-x64
MIG_29.dll
windows7-x64
3MIG_29.dll
windows10-2004-x64
3PascalStreams.dll
windows7-x64
3PascalStreams.dll
windows10-2004-x64
3StarBurn.dll
windows7-x64
3StarBurn.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3WiaDll.dll
windows7-x64
4WiaDll.dll
windows10-2004-x64
4bs_load.dll
windows7-x64
3bs_load.dll
windows10-2004-x64
3bs_wm.dll
windows7-x64
3bs_wm.dll
windows10-2004-x64
3contmenu.dll
windows7-x64
3contmenu.dll
windows10-2004-x64
3gdiplus.dll
windows7-x64
3gdiplus.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
disk_recovery_wizard_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
disk_recovery_wizard_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
BlackShark.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BlackShark.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Disk Recovery Wizard.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Disk Recovery Wizard.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FLUSH.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
FLUSH.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
MIG_29.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
MIG_29.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
PascalStreams.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PascalStreams.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
StarBurn.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
StarBurn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WiaDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
WiaDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
bs_load.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bs_load.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bs_wm.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
bs_wm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
contmenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
contmenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
gdiplus.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
gdiplus.dll
Resource
win10v2004-20240910-en
General
-
Target
Uninstall.exe
-
Size
327KB
-
MD5
f8e51b09aea1acb19bc5fd1f6aa34907
-
SHA1
241e10a41f215b179f7ccb25a2dc822b6d118dc1
-
SHA256
6f4915a3017fc12182e514be8600c9b51c6bfc87de110201ccb94058db7fdc6c
-
SHA512
cdf8bfa7a074e202957982c6ec9c59df0012c6ca69927a75e26857bab4594d7025649be923d6ccd26ddb76aed60d54447cd281cdc46520fcdbbc36ea437c1405
-
SSDEEP
3072:AhT2137DYmJEt/FnsIkUM3iE9S4OKAk0zSbVuTS5siApDUc++towaYjtsn/7tREj:AhR7VRzqAfigAcqtRE435bH6Qr2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 2096 Uninstall.exe 3036 Au_.exe 3036 Au_.exe 3036 Au_.exe 3036 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral19/files/0x000500000001961d-2.dat nsis_installer_1 behavioral19/files/0x000500000001961d-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31 PID 2096 wrote to memory of 3036 2096 Uninstall.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
619B
MD571c9f3e30756661432e2b775af20996c
SHA178ea24f6547067931125abde3b6eed462150e8eb
SHA25695a40a848175474e2cbc9e73c451cd92642ebd3e6bf2050a7eeb9d8f6ce6f4ac
SHA512302e0c6435adfe63d172e76324f5827cd1a9d4d2946b5828a53177261440f2cec99406b9c9aece990cfe833246f6873e6a196ffc7ac3aa4fc26536361715c100
-
Filesize
14KB
MD53809b1424d53ccb427c88cabab8b5f94
SHA1bc74d911216f32a9ca05c0d9b61a2aecfc0d1c0e
SHA256426efd56da4014f12ec8ee2e268f86b848bbca776333d55482cb3eb71c744088
SHA512626a1c5edd86a71579e42bac8df479184515e6796fa21cb4fad6731bb775641d25f8eb8e86b939b9db9099453e85c572c9ea7897339a3879a1b672bc9226fcee
-
Filesize
327KB
MD5f8e51b09aea1acb19bc5fd1f6aa34907
SHA1241e10a41f215b179f7ccb25a2dc822b6d118dc1
SHA2566f4915a3017fc12182e514be8600c9b51c6bfc87de110201ccb94058db7fdc6c
SHA512cdf8bfa7a074e202957982c6ec9c59df0012c6ca69927a75e26857bab4594d7025649be923d6ccd26ddb76aed60d54447cd281cdc46520fcdbbc36ea437c1405