Overview
overview
7Static
static
7d4c8a3819b...0N.exe
windows7-x64
7d4c8a3819b...0N.exe
windows10-2004-x64
7"aminstall.dll
windows7-x64
3"aminstall.dll
windows10-2004-x64
3"solitaire.exe
windows7-x64
3"solitaire.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3fmod.dll
windows7-x64
7fmod.dll
windows10-2004-x64
7Analysis
-
max time kernel
100s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:44
Behavioral task
behavioral1
Sample
d4c8a3819b2059058dd8a62885f70d40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c8a3819b2059058dd8a62885f70d40N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
"aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
"aminstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
"solitaire.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
"solitaire.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
fmod.dll
Resource
win7-20240903-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
86545cc1d7a3fb9fbb64c892a680b52e
-
SHA1
886126e346fff55cd4f5fed002808bc8a686d8ff
-
SHA256
4467f1b1c277eb2019e67372b6ef4cfb3dfbae812f82c3fd111f11a92a9c8ba2
-
SHA512
778691da163c66ff516c633668d1a861af7dd7bb02701d31d0885ea0e009a6744f724df59c0524ef04c2faaac55091d5e0de68acb79ad8489a3d4922d1dd84db
-
SSDEEP
1536:XKe0DnjRrJav2FnUIRr2vMYBJvqAELVigvHhn1bi+v/5Qmdm:XGD11a8YBJSAI0Q1bmOm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 A~NSISu_.exe -
Loads dropped DLL 5 IoCs
pid Process 464 Uninstall.exe 2388 A~NSISu_.exe 2388 A~NSISu_.exe 2388 A~NSISu_.exe 2388 A~NSISu_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral13/files/0x000d00000001225f-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30 PID 464 wrote to memory of 2388 464 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5cd581014a480eaddb0fbff17e4690da1
SHA19e35c551a2d3ca68d24662c8e7c7c1d2e01fb209
SHA256bff9be1f56d079f680d50bd70ea7accbafa497a5d9db23e705dac5d34562839c
SHA5121df4ad4c0dbcf3eecfe89715f63814154b95383cbe2cdee6e0b9f167fbecf4431710d32d0af5507738d0cab96df8a66337058f0ec55242eb6618df8021a87114
-
Filesize
66KB
MD586545cc1d7a3fb9fbb64c892a680b52e
SHA1886126e346fff55cd4f5fed002808bc8a686d8ff
SHA2564467f1b1c277eb2019e67372b6ef4cfb3dfbae812f82c3fd111f11a92a9c8ba2
SHA512778691da163c66ff516c633668d1a861af7dd7bb02701d31d0885ea0e009a6744f724df59c0524ef04c2faaac55091d5e0de68acb79ad8489a3d4922d1dd84db
-
Filesize
12KB
MD54c7d97d0786ff08b20d0e8315b5fc3cb
SHA1bb6f475e867b2bf55e4cd214bd4ef68e26d70f6c
SHA25675e20f4c5eb00e9e5cb610273023e9d2c36392fa3b664c264b736c7cc2d1ac84
SHA512f37093fd5cdda74d8f7376c60a05b442f884e9d370347c7c39d84eca88f23fbea6221da2e57197acd78c817a74703c49fb28b89d41c3e34817cc9301b0b6485a