Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 17:51

General

  • Target

    uninst.exe

  • Size

    184KB

  • MD5

    cb0bc2de7c9ab930131e581c3b31bca4

  • SHA1

    279aa40f5138605af3020d845ac3db8599a3dffd

  • SHA256

    86d4427001e8edafbd4e5ae9d4d1e66ff922431553bd14e3c1e84ff0ad898bcd

  • SHA512

    feeb3d59a5fc9fd2b131ec7485633e579d849f4256263d24c5783c5b917380991f46f7d41d53bb9937ba0aeef9bd5685c9388fd3259e2b02e6ef13a4aad9b551

  • SSDEEP

    3072:v3c1fP4AJJb2WrSfqW4C3ZtRltDcFtlEes8WOfnRNUmDjQ:POPjX6qYQlEesO/R6cjQ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.zhuti.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f14ddbf998bfb8854bd250aff01a4aa0

    SHA1

    660e653397db88ba061cf9a5e397bf778ca783fc

    SHA256

    3869a8753b79b8f9a2e31d0a98e5c8335a82d154dfcab26557bb2869e0b89f3a

    SHA512

    7d8eb66e76648b937b66f65f32801b98052766ccebaa1f6312851e8553e1e34d874fe8c310d3ed77297a0b3b735b5953f27c5a45aca88a98cb4d1dc80050553d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af41fa8d2d0659c4caa207db9b7a3f34

    SHA1

    bed7ff5e95ab2e53116366d41fb9db9fb58e2b9f

    SHA256

    19eabd68a172879df241d8ccf306a42524c65bd005274189651d956f3332ee07

    SHA512

    309475388310f92ff1aebdcd502c9f18e0548d928c9c2b6fd26cc70931248e896c80f07e06266098f5a10c74c0d0287ba4203788d3e87ed1b31573eac5a042f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cab063b0d5bc167c0dda64c00022f73

    SHA1

    1d8e866a54183e73134a4830cd509f81a17a4bc8

    SHA256

    da82f6d0452581cb0c0b22418bba9ed716230f7237f118248c478c4f2934106c

    SHA512

    295d12b5a101fb6dbc94e815f40d024bab778334b772a40de6b06e2bf558a050560795b29f834ff247c4191512d88b4e743cb8474110438a6b494f76a378aebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2227b406f21f5091bcc0c55e04672fe7

    SHA1

    764925f30270c80c206057290f12fa1a9db2663d

    SHA256

    0e21caa266df1655e071f5d692242c0e5773112d21b68d1291f84b8ff9909435

    SHA512

    395b7721c0232d5339b047b654b6e26d540e309c4188823defc22d3e69b2cd3e28fea74eab7c8ff7575264f6c1f049d7be372847a538fc5e89c7d046082f8815

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f33e56aa62e843210dc0bf5b61b4911e

    SHA1

    8ece5aa1269c9b4ee22d0775b072980d6cdd19b6

    SHA256

    d0d70dba5f703357d27564a1d1b6a2e932690ee586c99b09b51f7ec2cc5c8820

    SHA512

    95f1427ee4b4fb2162a9c11a980ff24e8e2f0eb82807488dc3d1fca6b7731e6e0afce27560885e553bf0a0ca08173b20fd0e3e7a28b97f5b001a3d533cf9bf9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b45876abc049fd8fd8f85f9120ec04ab

    SHA1

    33d082b83547c60808f4a82284a278763cd13781

    SHA256

    fe7575dd5c57ea6c1b425cb77bdf96b859bdbd24ed970e66ec6f2ba6fac9c241

    SHA512

    48df4b97cb0ba0f662a353f3799cbdda6462323f640d3dcbdc214f877905de5a95ee2e2232718a1d338bfee3295eb81a53ba443704d15a309c01af67240932da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d8e7d47945eb7f6f97c5fa84f9d228e

    SHA1

    274924d97a0eed5298aff5953fbcbe3871ac8935

    SHA256

    d7bebae90e245823f70b766f3878fb98a39aff51267e5c34928bc255bb85e170

    SHA512

    998b30910df81e1cdc4fe95e394a6c7230ffe86676de64c1b12e4465f17dd1fbab3f56a4ebdae66de9dc8b697b7c9b121230e6c6195fa5f1b7f2887285a7a99f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f0be222ad3f3d18dee42ab1f77af495

    SHA1

    ec5dcc99c7c7c87b6d8aa98fc499fffddf622ce1

    SHA256

    955fe52d3701edd575ac430152ca5df300d440ba4f5f310a1aa3d8e6a5df9ae7

    SHA512

    64028e933605cef75b5954794af6038a0dfb60ee7b3bb3e04e33a0ab80c6c6bd8e4299202902adabd32e86a30310524df643651eab4f86ed64832ab00f0a6742

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e936d3e3e4a9f5cf00321f859863c57

    SHA1

    93f92ee2e35fdb2102ab33aeba0d45bb64c6d221

    SHA256

    4a27d0f2026bc0bda328b531059a2ca526e99f5d450a795d998dc0720a2b946a

    SHA512

    6fbc38255d094b03a5d26ad4874184dbdd71ed0257bd617ccb212cc60c2f4b394589cbb141380c90eb394b5d17d896aa69ac34832237159902f361d977c4d0c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8318d9f0b9f4f5dfd7f208b4edfa09fc

    SHA1

    4de3cc56116e470f1feea7b0cf804aa890a2b01b

    SHA256

    a0e7f49da3f82d8cb356d0f612df5924a034088d40893a15c29adfc517c46e2d

    SHA512

    94c188d912a20e9d47fdb794491648b6399f70325a5e63b0876923d20dce75d5f1920708a4f6adefba89093999f010c17544dc158295ef17eaee4078ae0872de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8eb93433ca5ad41cf296d40df98ff478

    SHA1

    abe58a865e526e747e0c6a99c65d633495a8facb

    SHA256

    7a6c7d571107d56a6bc5d30a471f1319b100bb8bbfefc456d39e9d93075ae860

    SHA512

    cde0f661470efaf0dfd34cefcd6372ba41384ac0cecd9d683e5af29524dd3398ad9ee114f7962ddd5bea27792fd3effe8a9fa46c0a3e801aa1eef1b175ddc6b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26b473ff939cb369046016b3eaf493a7

    SHA1

    71ad808f074a18dd409aceafd318038ea7264e4c

    SHA256

    f2ce9d307406115f463a9322332b00c113ee77e600d1fc3f35f02f1ee1236dca

    SHA512

    04e4926517a8da0604cc1b8eb59f3636e88faf42afb1f030f54f07ffc8d72f801feee688b72c8f396e9259dabd8af9c6db955cadf2331b70ef5e20d59c6fcd20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    736d2c747dc20b59a9ceac00e997c0b4

    SHA1

    e192ae8b56ad42b9579fc5c0800d60deaec460f2

    SHA256

    0ffe05a61f58047d7ffb08b269154fbc0f930813bef4ccd8dbcfdf85f48cbdea

    SHA512

    9ebb4a29da6b5c61623fdf6f4f900cf8e5186ca175ecd25a5a3329c3b94aab77dbc22e28c2ebfb6ff57e6dbac5f42ba1d76a1d4bb11f1aa2ae927d09a72dd48b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23d787faebb7b41169d18b6493821637

    SHA1

    45d93f74c6370947ea5c6cb5a19d6b531d398d53

    SHA256

    9d863133c6d623bd78fa48d90a5997b39a901bd2494c6825f10849c2f25145da

    SHA512

    31f1f2a223ce77128e523b9c35d1824db1714ee4a72a79699e297d7ebda07c0dde80ced7afc244edaf09daa0ede12a923d1ea9069b27b1aa37cc4449a6ac6196

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1626fc7c3cb381fc6aa2b9db0ea843eb

    SHA1

    9383b072fee91102d97b7209596b2c464c911077

    SHA256

    703f645848521aa5b41d8a440a5a68393c85e0a793306c148f03443cdd446407

    SHA512

    21c97cdcc3ed795ad89f78d46d4fb18ee08a9fb4813dbfa09b7a447efc8f0a19dab67a9dae14d433827cdc07c0bfb27cb840490d819f35fe5400875d61093fe1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    029987d06912be007dab2941861ee74a

    SHA1

    8ad2f8fb085172bbd5006838dd63cdfa1173ec3b

    SHA256

    bc477fea573de8b44e3b97209ae458fcfff338dbc59c94423b210b0e8b59c8be

    SHA512

    c3e3fb67c1c2ebe71aa42ea63af094ef7837ddedbcc8c826b5d485f46a6d1e2f60a2dd839e8ef29dd0ef5ecc8c6411887cc24bbb80beabc28f78c7d6db7206f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d42d9de2b90aef94b295ca489ba5ddcf

    SHA1

    a5be71c88586ffa003ccdc696d0fdbfb6d3fa7c7

    SHA256

    222e0f1976ec8e96b2bfd40995d7e4e3d15c50819254e58122ce3e68c6540ab4

    SHA512

    27633a0573044f4600f45b6e60bce086280123969ecdc771ce029ade51db0f841d1e8c91dbb191fbb6d3ef286e5501f8a11c6d759b525f9eb21f9a5b800fb2b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f1b544d4a694a0ac159bd518e235257

    SHA1

    369bb03ff306d7afcaf8557f51c8acbbaa952a02

    SHA256

    fcabb7995952119d00ba068aa482e8c884df03671a822313824dfabd53c7bec6

    SHA512

    a17ed7bdc14ba8a1189c7724c7ee2015c3b91610b5f1bc3f345c5c4dd04e8256cd127a11a0d9a06fb0795084ebcccf056e41cbb21535c4ab233873dce46cc7b5

  • C:\Users\Admin\AppData\Local\Temp\Cab9B68.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9C07.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    184KB

    MD5

    cb0bc2de7c9ab930131e581c3b31bca4

    SHA1

    279aa40f5138605af3020d845ac3db8599a3dffd

    SHA256

    86d4427001e8edafbd4e5ae9d4d1e66ff922431553bd14e3c1e84ff0ad898bcd

    SHA512

    feeb3d59a5fc9fd2b131ec7485633e579d849f4256263d24c5783c5b917380991f46f7d41d53bb9937ba0aeef9bd5685c9388fd3259e2b02e6ef13a4aad9b551