Overview
overview
10Static
static
3dca6e2b783...bb.exe
windows7-x64
10dca6e2b783...bb.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
dca6e2b783dab78c14ddf9091de65952665a614ecdc8124d9ffe02cca3315dbb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dca6e2b783dab78c14ddf9091de65952665a614ecdc8124d9ffe02cca3315dbb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
83KB
-
MD5
5e82b3c5192a8a56bf96750c99679ea8
-
SHA1
a92dbc98cfa27ebb82f00f1b9fdffbd1f96c1ac0
-
SHA256
78813c6eaad738de591046a6cc2e1d7d436d2e622057435f8e6e628bf1c7c202
-
SHA512
81eb5b2334660f64ddd2feb228d7cff658ce1d264d75c57655134ca46527d1ef8d1762497fccded9be97ec8762011cec65f4172873ad518f68ca3f055408e867
-
SSDEEP
1536:X1E/rzW2pakRmB7BW3nKsc9YRN6QcIGO8ig7+3rOpA2aCf:X1E/rS2paccKntc9qt8xormA2aU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 812 Uninstall.exe 2372 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x0006000000017487-6.dat nsis_installer_1 behavioral13/files/0x0006000000017487-6.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30 PID 812 wrote to memory of 2372 812 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55e82b3c5192a8a56bf96750c99679ea8
SHA1a92dbc98cfa27ebb82f00f1b9fdffbd1f96c1ac0
SHA25678813c6eaad738de591046a6cc2e1d7d436d2e622057435f8e6e628bf1c7c202
SHA51281eb5b2334660f64ddd2feb228d7cff658ce1d264d75c57655134ca46527d1ef8d1762497fccded9be97ec8762011cec65f4172873ad518f68ca3f055408e867
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6