Overview
overview
7Static
static
3disbelief-...er.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows10-2004-x64
7$TEMP/vcre...15.exe
windows10-2004-x64
7DISBELIEF.exe
windows10-2004-x64
6ExecuteShell.dll
windows10-2004-x64
3Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows10-2004-x64
$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows10-2004-x64
7data.win
windows10-2004-x64
3discord_ri...ce.dll
windows10-2004-x64
3license.txt
windows10-2004-x64
1options.ini
windows10-2004-x64
1Analysis
-
max time kernel
430s -
max time network
443s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
disbelief-installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/vcredist_x86_2015.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
DISBELIEF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ExecuteShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
data.win
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
discord_rich_presence.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
license.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
options.ini
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
157KB
-
MD5
1024712976464900cedcaf6eeee10d2d
-
SHA1
7a32cfb3da4f9f381274ca867f5d5134d30b982b
-
SHA256
98053320c09e50672d19be20526a12eeb42543b5d9341e2824e672fb494aba40
-
SHA512
923af4b868ea2f838add7e16f6bc4d12b0cd45eda6bc6058edac0b1d0257703d0c44cf229195112f635890ff5aeabfcdf52e1e605dd7d0dd3ad0f554443aa669
-
SSDEEP
1536:PpgpHzb9dZVX9fHMvG0D3XJBgBLIAIKS/x3UVIuQnLf2/:xgXdZt9P6D3XJBIIAqx3yI7O/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4616 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x000a0000000233d2-3.dat nsis_installer_1 behavioral10/files/0x000a0000000233d2-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4616 1972 Uninstall.exe 84 PID 1972 wrote to memory of 4616 1972 Uninstall.exe 84 PID 1972 wrote to memory of 4616 1972 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD51024712976464900cedcaf6eeee10d2d
SHA17a32cfb3da4f9f381274ca867f5d5134d30b982b
SHA25698053320c09e50672d19be20526a12eeb42543b5d9341e2824e672fb494aba40
SHA512923af4b868ea2f838add7e16f6bc4d12b0cd45eda6bc6058edac0b1d0257703d0c44cf229195112f635890ff5aeabfcdf52e1e605dd7d0dd3ad0f554443aa669