Analysis

  • max time kernel
    117s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:52

General

  • Target

    uninst.exe

  • Size

    376KB

  • MD5

    24c0e7f67edf9bd416b39983b459d2a3

  • SHA1

    8ba081f93353548a673a34074ee9b8a9dc90b07b

  • SHA256

    156130b662935c1086336e0e0f35df7f3231af3dbdb199a37e2c6d0d1cbcd477

  • SHA512

    12ec35f00480d49edb0c4d961759a4801179067658a26bfafd962dc5d23c99f6ea7ae284ba22dd0be0ea2d02de90c10d598f03d6d7014f036abb097bf68716df

  • SSDEEP

    3072:k3c1fP4AJJT2WrSfqW4C3ZtmltDcFtlEesdTOUN6QfOcp:mOPjH6qY3lEesdTnN6Qdp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.rmzt.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    863fc358377f6484025cdc217e4f1009

    SHA1

    cebf162f1ff5eea216d4715e337f46d440193baf

    SHA256

    234da0f752d8d257a4ef40a5168b5c32e49984b3012389505761ced6694f95f9

    SHA512

    feb927b0e7be3119055567ee627bf8a82a0444217a6365d0e06ff7d6e33b84ca8c3db2e9c62e976d5cc8f7b81da2576cfc1a7d614e772f16573be0cb58108dc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0fa5042f48d53818c4cf39bb98d3557

    SHA1

    b4858120f914529aa67b3a8e46b944e295f6508d

    SHA256

    f5da88e6a61a9c2a448dc0b0292c68d015f016020f7158d6ecde4fa155effcd4

    SHA512

    e3bf634c37e82c6260fa732c1c6531b742aebf3047567d1100e0fc490fd2dac5c087983a40513f66f1a96274b96e0a2c407e9371ec4784fcb0c7767d2d75381e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f677dc21bfd88202abcfb5c45ba7ce8e

    SHA1

    edcdb56fc8ce0712f88bbec1e9e57f002e9e41ca

    SHA256

    9e53209374844e49058617b31e791b5b7e405e6b25e0cf9c9251916db6b32672

    SHA512

    29f1813c216ee28ff736971890e5bcc2cd91d23bde7c20a2e75b856c872cb444d3e37ebe351c51afe2ba7adb4d2dae549f890bd34fb6a26069caa6206840ce4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fac3023cd78016f5428f22420398fdd6

    SHA1

    99c52bcc37db24ce1f6f3c865dc38d6d8580a24f

    SHA256

    6a23e6a9932abed488ea878ddf9318b4a0d259372e02fc63c2f6bd9a0c36c469

    SHA512

    c175c03a861be957073f27b3e5b2a547b2afa39210cbccbbbf416c82f7d8a011abc37a30c1dbc45baeed63db0938cca55d37040cba7c1de2465d82ac3929d6b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    521abc5c3faa7b4d3bca8314be613f8c

    SHA1

    7bdc6ba4024602d4920526d0f21bbca6f41889f0

    SHA256

    f5411301bfb08a1e924e22b21255f543c57d62ec658d4ad5e52dbf85ce94c27c

    SHA512

    97a96c235402eec94f8ee810ae63a42f41a29e5ecdeea2fab4e4e4fc2f1fe7e4b69d25b023cfb14761491475074fb8b7e775fd7ef538309aae93c3e1e44072a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc589a46bccbe932d9bc8ca6a9014ba5

    SHA1

    afd1369407bb794a581b82288d04303dba05c614

    SHA256

    1fcfd9596d00b8d06f1ddbf9d31928a25fa1896850d7e8cfc1651428ef64b02e

    SHA512

    676bf67030ffa5f2bdd437fe6233e31c2ed0ebb45087a58d13f8d930b31098bfff3b5b71db244fccb0a36bdf82b3e8084d369c3053719719ad3b800081c66444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e55f7af0b49616cee754c0418900359

    SHA1

    fe134426ba9c14c50009fd4887e877073ce4dc4f

    SHA256

    9a860bacb24030096f4379b820e98a5f03cf54d082f3c441ab3563bd303294b5

    SHA512

    9eb1130d363162f54ce04ed7c2526b833d9e4273e3cb9f4314336d19908f7af8d12f0f32ddf48063511db32443e3da7d1d8dfaf0135c641b171308693774896b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ce51ce3deb69495e4cc033d6107986f

    SHA1

    8eacb4f43ac5a3cc269e11a01470915a34d9db4d

    SHA256

    002a750958761edaa339a17722bd3329dd9b5f14fbaef3b469f7e0301e4a64ca

    SHA512

    c622255632caae6a446897522815f2e38d3ab54497860d0644503105d61aaa99d55941eae5ca6e37c91d1c4a5ca43af7539e8670872d191d531adee566a99e71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99b12eb45e23e554a2bf944c8c5381e8

    SHA1

    e0ab5b343537c3dbba8ff0df9d956ece615c1615

    SHA256

    b7c4f0bc7af249170792b3e5f7ac5dfa705640f73b54dd2d16ed5c23095664fa

    SHA512

    39466709796ec9762b05ef312b878b2df5e33be9c9caae3574fada1404b2fa8295dee177825b43129201f30bfd3b6bba8103e9280672b806ac0866d1ecf0281d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5fb550aafddb7de850dead4c8f850ff

    SHA1

    346199e17dc6169d7ef2c6727cc6c22464e43990

    SHA256

    6a785cf75baa04ca94b49abd529fa3481aeadd051293b3bd90517e3bf95b2739

    SHA512

    e457fc194faaba9400c0fb84350b0091c12113ef9d101dd6348a46d1f6c8ce224e639423282428388dbfd91aed590d9b92c4baaab50ea33fced4aa9dd3e43b60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    060aabd1661c5d0ac06ae12df784c08c

    SHA1

    0cc9dbc24a3e25bd7d4b0053754939b17fe4418d

    SHA256

    5a0e13118a74e01fb857805b8b102eca04e7e0dd2867c333ed778194d6058516

    SHA512

    4e7116ef9c4c1aef9e21af8a8581fa57736187431c7669d8e2bbcb5f08afb7fdf53f3362c004fda9c34c8392fd4bfedb57a007f0881b4bf862d034a0b9789696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb000701b07a2956011d0800aff2a994

    SHA1

    356d4372a1dc1bed18a97128eff993bd9c8fe31b

    SHA256

    1dfdf3581b45577b0c39d79f6d309d883c39532d5d65dd1b09e9cdbaef3e5cf1

    SHA512

    d2e5753989bcd4df633a44582d230b8e5e5a5cb88aa0ae91e7edbc4109da67b6390a163c5108b577dcf51cf60560101c1799e7f34cc665e6818dd5f2179f7d1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ea4e092fedf751b3fb56d156f0a1169

    SHA1

    6e608506a4b4b5c854bae5510dd2bd1799488ff9

    SHA256

    123342430d5eb1d3d876cb285a933fef1b55e96d818d2788c4b35bdf8a3e756c

    SHA512

    93c8f8f2d054e8467b7449acd9300df046195faa7e6c6199cfb5a9ae7c68c9b0ee5bbdada5439609a403053c395e4ccf0a50053398f25ffe3cce7172fde4f59f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42d27df25d019f2c5e2a025a9efbd073

    SHA1

    12330d11921e9cf91919c998116c64bf9834cc19

    SHA256

    5df028cd4b31eadfd519a1a6730368f11d49fa149bfbf3cc0c9548e41875267a

    SHA512

    9a2ebb71869fb393999d8e840f23d223241eae0651d9ca4b5b2105c9c5c23c58ebfd97d71f9e06492acf1df362461b5065995db118dc944efcc9b1aa82a4a8cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ee7e359bafaf48b7ee23754951c1bf7

    SHA1

    124e725e62af35b26fb7736f99a12a1860626330

    SHA256

    ebc442ce76afc160389164f1686a5e3f266b7f50093cc09c181495477fe068d2

    SHA512

    adbd95461ed71ca43cbace4d430e9ca30ccbefdb18a64af6e015c04be61cc80032450b067cb84adf23a96ab47f0911b3675939f115793c691b2ad8d880305f45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1026905998e6906a7b530a86775bca9c

    SHA1

    1a7c7e20bf2fc82893719be8d9c011207392989c

    SHA256

    7530308a3c1d5e27b75431a5fabba663c4db156e2bfac0e88d95248e236e4254

    SHA512

    e570b3838d1ee545dd01d4067d2c5fc9327523e714f5daaafd2634472f110e921030e1cd2a3a703127e880e3a328b65ef32361f0522386121932041470ff1e85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e73b92cd44d10220c6de21eece42c375

    SHA1

    34ca10533d80047014dfae28849e7d1fcfa7166e

    SHA256

    2bcaa877115ef401bd39374c28678cea72ebd82478c7421c1415ce543f291146

    SHA512

    c7f16838a60141b577aca665c1d4b94ab26f738a659b9718fe0ca2f048c6814b2b4846b7713903ab50e99de5ab5063a48f30ad1f363beaea98c8843b7c81ba18

  • C:\Users\Admin\AppData\Local\Temp\CabD839.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD8E8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    376KB

    MD5

    24c0e7f67edf9bd416b39983b459d2a3

    SHA1

    8ba081f93353548a673a34074ee9b8a9dc90b07b

    SHA256

    156130b662935c1086336e0e0f35df7f3231af3dbdb199a37e2c6d0d1cbcd477

    SHA512

    12ec35f00480d49edb0c4d961759a4801179067658a26bfafd962dc5d23c99f6ea7ae284ba22dd0be0ea2d02de90c10d598f03d6d7014f036abb097bf68716df