Overview
overview
10Static
static
3HA_SendLin...re.exe
windows7-x64
7HA_SendLin...re.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Assi...fy.exe
windows7-x64
8$TEMP/Assi...fy.exe
windows10-2004-x64
8$R0.dll
windows7-x64
8$R0.dll
windows10-2004-x64
8Assist/$R0.dll
windows7-x64
6Assist/$R0.dll
windows10-2004-x64
6$TEMP/DUDU_HH.exe
windows7-x64
10$TEMP/DUDU_HH.exe
windows10-2004-x64
10SendLink.exe
windows7-x64
3SendLink.exe
windows10-2004-x64
3SendLink.url
windows7-x64
6SendLink.url
windows10-2004-x64
3SendLog.html
windows7-x64
3SendLog.html
windows10-2004-x64
3SlideShow.html
windows7-x64
3SlideShow.html
windows10-2004-x64
1Support.url
windows7-x64
5Support.url
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
HA_SendLink191_Fire.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_SendLink191_Fire.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Splash.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Splash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/Assist_hanzify.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$TEMP/Assist_hanzify.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$R0.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Assist/$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Assist/$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/DUDU_HH.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/DUDU_HH.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SendLink.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
SendLink.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
SendLink.url
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
SendLink.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
SendLog.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
SendLog.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
SlideShow.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
SlideShow.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Support.url
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Support.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
56KB
-
MD5
53731b89e1c5fd02c209ed4129db684e
-
SHA1
78a34ff0f17a6fde269b31d86db99036e01cefca
-
SHA256
055140ecaa73d6bc79ef49173f6fbcfef3fe35619e9cce538eddca9b3b9023c4
-
SHA512
f9dbabe261e526351025bfbb9e81cf76e83da041d9523d28e54cf4b1808559b6920e69865189822319c5a86ee0a8ffda227c1483e76d1601184938b0d501c6c2
-
SSDEEP
1536:1PgXwpm4RmzZwCnUF2ICqdkJI6P+ZCsBTjt2bm:1PgXLdqF2fqdkJI1CiTjt2bm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4000 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 4000 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral30/files/0x0007000000023cad-4.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 808 wrote to memory of 4000 808 uninst.exe 84 PID 808 wrote to memory of 4000 808 uninst.exe 84 PID 808 wrote to memory of 4000 808 uninst.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5dbab668ce84d6b38824ed1c9b9121adb
SHA1de8c80d7b0d01fafb750b2bded1f055d102aa3d0
SHA256ede19cf9613ccbf2f4c731f6eb1460efe56484e97c8a0745a2a5460571e64f11
SHA5125857680db3b642f14742ad55a3349cbe059c18c5dc58ae0def53886df5eb2c9abf5e444db1bc8449db779c33e940f8f2c4a7520ad8f374b9f2f01e57d6a2c953
-
Filesize
56KB
MD553731b89e1c5fd02c209ed4129db684e
SHA178a34ff0f17a6fde269b31d86db99036e01cefca
SHA256055140ecaa73d6bc79ef49173f6fbcfef3fe35619e9cce538eddca9b3b9023c4
SHA512f9dbabe261e526351025bfbb9e81cf76e83da041d9523d28e54cf4b1808559b6920e69865189822319c5a86ee0a8ffda227c1483e76d1601184938b0d501c6c2