Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 20:11

General

  • Target

    Uninstall.exe

  • Size

    353KB

  • MD5

    0d9760e79d8f8fc21e399fc45a9902c5

  • SHA1

    c789a71b49b352b34b4780a208eeee8e9151c067

  • SHA256

    37c1e790213250e020df04f82e7d92e0953ad0ea860f4f2ae3dddeb0c437424f

  • SHA512

    248864d47a57a5f85a29422b525860e99e1eded88d29a8efb2349a900b75acda6efa483025d4bd1198a0a95bedc0416c53a4361bc54e5a22ff2eb162575acc72

  • SSDEEP

    6144:Ve34Q/Q0RXiD0xvahQpE3M5cJ58sJuCBhmGXiJrHBWbU+0H2XS5:E/Q0HqM5ITJuCBhdXCTByU+0WA

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nseE9F3.tmp\header.bmp

    Filesize

    154KB

    MD5

    2437b69ae604ffd36c6e41138e6f0bcc

    SHA1

    cd4d9b602e1bc185f31eca1f6285c251e8319b5e

    SHA256

    f1aad57faac98a8f9be8b0e9e94c80c5c310e278741a4f680b9cb1e869f4a448

    SHA512

    64962d0d27eda60c37e009399f42d9c7e30b9bbf1d30672180f84d96444b09343626073c2fcfe54a456655bdc420022753249d4983e338b58ea6002c62b6abfd

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    353KB

    MD5

    0d9760e79d8f8fc21e399fc45a9902c5

    SHA1

    c789a71b49b352b34b4780a208eeee8e9151c067

    SHA256

    37c1e790213250e020df04f82e7d92e0953ad0ea860f4f2ae3dddeb0c437424f

    SHA512

    248864d47a57a5f85a29422b525860e99e1eded88d29a8efb2349a900b75acda6efa483025d4bd1198a0a95bedc0416c53a4361bc54e5a22ff2eb162575acc72