Analysis

  • max time kernel
    96s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 22:00

General

  • Target

    Uninstall Wheel of Fortune.exe

  • Size

    59KB

  • MD5

    71970ce7a4dd3424e656930506459311

  • SHA1

    8c5de5aadd81695495badb022dcf7c5f8c34f2a8

  • SHA256

    c1e50c418732207509d2ec297cae88b9e6e03f8799e5da8d2a2f03d9626fbf05

  • SHA512

    cd3f9e1ed69dd45e4b7ef344dba1089dd894f81e4178e4e0421e3720f76b56b7957453b4adf7de5bff4d0378cc6de9a6bd992b624d56abc116d910ee5a230d10

  • SSDEEP

    1536:UG0Db1wJdBREzA01xVubM8JMLeAyBdgsgmimq7:IDb1wHBe6bM8JgeA4CsI7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall Wheel of Fortune.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall Wheel of Fortune.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe
      "C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    59KB

    MD5

    71970ce7a4dd3424e656930506459311

    SHA1

    8c5de5aadd81695495badb022dcf7c5f8c34f2a8

    SHA256

    c1e50c418732207509d2ec297cae88b9e6e03f8799e5da8d2a2f03d9626fbf05

    SHA512

    cd3f9e1ed69dd45e4b7ef344dba1089dd894f81e4178e4e0421e3720f76b56b7957453b4adf7de5bff4d0378cc6de9a6bd992b624d56abc116d910ee5a230d10

  • C:\Users\Admin\AppData\Local\Temp\nsb9720.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    419d642fe3436fda8bb22eea9c37a6ca

    SHA1

    c1644131b880c6e03f14de3c79efd27093a77908

    SHA256

    25c4f65b02eca4ad897d7a623b3ca1290bac836e98ab5ee5f6c527dfb6a41dd7

    SHA512

    29df088e3b5189efd6fbeebc2f23c5850303d40fe5331cd336bb852d986f9ab66f7bcd963ebf8c4e4eea7d49a6590027490d651a3e4781024c7983a2c456a337

  • C:\Users\Admin\AppData\Local\Temp\nsb9720.tmp\spd.dll

    Filesize

    4KB

    MD5

    8bb77ed61759966728b7cb065e0081ee

    SHA1

    b2f1407daf21b301abea7a20cdb7fd181e3ff042

    SHA256

    ab5496eef3b68e865ef79bca1a88813876589d7d63bc76808d6df38a88eaeb80

    SHA512

    419541ad425373dab928f00e60bf83b19d53268e6d151d467a13dfabdb7a6a179b93c3f51c7fce394b062d619fdfcac587e3c7110ce1582c9d5e7ef85ec4cdf3