Overview
overview
7Static
static
7d4c8a3819b...0N.exe
windows7-x64
7d4c8a3819b...0N.exe
windows10-2004-x64
7"aminstall.dll
windows7-x64
3"aminstall.dll
windows10-2004-x64
3"solitaire.exe
windows7-x64
3"solitaire.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3fmod.dll
windows7-x64
7fmod.dll
windows10-2004-x64
7Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 05:44
Behavioral task
behavioral1
Sample
d4c8a3819b2059058dd8a62885f70d40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c8a3819b2059058dd8a62885f70d40N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
"aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
"aminstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
"solitaire.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
"solitaire.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
fmod.dll
Resource
win7-20240903-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
86545cc1d7a3fb9fbb64c892a680b52e
-
SHA1
886126e346fff55cd4f5fed002808bc8a686d8ff
-
SHA256
4467f1b1c277eb2019e67372b6ef4cfb3dfbae812f82c3fd111f11a92a9c8ba2
-
SHA512
778691da163c66ff516c633668d1a861af7dd7bb02701d31d0885ea0e009a6744f724df59c0524ef04c2faaac55091d5e0de68acb79ad8489a3d4922d1dd84db
-
SSDEEP
1536:XKe0DnjRrJav2FnUIRr2vMYBJvqAELVigvHhn1bi+v/5Qmdm:XGD11a8YBJSAI0Q1bmOm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3800 A~NSISu_.exe -
Loads dropped DLL 1 IoCs
pid Process 3800 A~NSISu_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral14/files/0x000a000000023631-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3800 4444 Uninstall.exe 90 PID 4444 wrote to memory of 3800 4444 Uninstall.exe 90 PID 4444 wrote to memory of 3800 4444 Uninstall.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD586545cc1d7a3fb9fbb64c892a680b52e
SHA1886126e346fff55cd4f5fed002808bc8a686d8ff
SHA2564467f1b1c277eb2019e67372b6ef4cfb3dfbae812f82c3fd111f11a92a9c8ba2
SHA512778691da163c66ff516c633668d1a861af7dd7bb02701d31d0885ea0e009a6744f724df59c0524ef04c2faaac55091d5e0de68acb79ad8489a3d4922d1dd84db
-
Filesize
12KB
MD54c7d97d0786ff08b20d0e8315b5fc3cb
SHA1bb6f475e867b2bf55e4cd214bd4ef68e26d70f6c
SHA25675e20f4c5eb00e9e5cb610273023e9d2c36392fa3b664c264b736c7cc2d1ac84
SHA512f37093fd5cdda74d8f7376c60a05b442f884e9d370347c7c39d84eca88f23fbea6221da2e57197acd78c817a74703c49fb28b89d41c3e34817cc9301b0b6485a
-
Filesize
610B
MD507072da3b796e03e8766b52b0ddc433f
SHA17a666bf3070c8b312f2f4ac004d656a47a5b9fb9
SHA2568fee907fb8e66bf32069123067292bed60a6c8a1942df9f3a79d7bfc89d6a86f
SHA51244a5d7586d70c727d023e47eb6c8c953fe552a3c1234f023b6e6ce19e726afcfc61f95fcd900acc49e2810a250637430d7137a1c77326eb7d9484d2c76f3bb84