Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 04:35

General

  • Target

    uninst.exe

  • Size

    376KB

  • MD5

    e912a6ed3832be1d40f3aa5a925d97bf

  • SHA1

    08dccfe1bbe4f104613eb6822aea486812e5e4ee

  • SHA256

    2109e062e3fd01c5f578df3c4f881087f0ab41cd287036005b05589e81156d19

  • SHA512

    7e17f79fb572d6c449e7a8d37d72b16e3150f2aeaa8a86c1910e65632154e26e7f28070bd4392bfc8fbcfc6ecfb004267f9b374884cf3cd36f647f1c1df71bc1

  • SSDEEP

    3072:k3c1fP4AJJT2WrSfqW4C3ZtmltDcFtlEesjdQ317NL:mOPjH6qY3lEesQDL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.rmzt.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faa0c33756ffc9db2bf32a206da9bfb1

    SHA1

    207a114b7d7c0634b21b80346fafbf160a31ca16

    SHA256

    10ffbfba367beaaf75617b5cd9d674017cdbb864a24558cf01e84f5ed23a6a49

    SHA512

    b503cfd5ccaab7c1e70b2f767e7bb9ab4cf6bfe631c1d08f05956c189dadcd99ff9dd5ab60e55595f59298b7de37457cc31c1ca3490db073d73d0c16d4e5d3b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bacf6754d13f4e9bf8fa4bd80a932035

    SHA1

    cfcb83c56f73316414d26c2f9d38666779a8c62b

    SHA256

    84dd66e88bcc9d21bdba3fd58df035da23dfd62641517b0d04e117a435a6fd48

    SHA512

    4f1b64d8def62b873f769f405108c49865d63a9fe2fe9f066457d3bf4efccd081c7aca3d365b3a5ab4d034701b2bdc0a482fffd85d7e633df8730c701b9dfcad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93bd5dcf77f4be63e53d1cbed2504e14

    SHA1

    e8d44ab0f032d0511ab9bf57872fc23b7f0392d5

    SHA256

    8ef234acb5488e7a3fbdc61f93dfa538bee9f9350c54085e328e0580ee230d73

    SHA512

    030fe6b445569a79127291b08ca1643d7e3cec784650a0694a0c82784b6baf1f92e427285a551828da32485c07d6dc26ce9cd73b5e0ef6f1dc6ff856e765fe40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1b0d0d266929fa9e7a79785bb35faa6

    SHA1

    cd7f83741d52ee32ff32f0cc3b1ff02f5a4946f1

    SHA256

    3edc74b6c12b85d4d9d16fdea618234bdd7ae1e0977c18599fea8d479c6770e8

    SHA512

    1578e640ceee0f29dfbd776c6b051507ea7a77409ab74c69fd604890ba56f5081c553d3b3a80b350690321348f079bdf7c8afddcb212f1a9f35c07659cc985d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb40eb26696336253ebe2552436cf9fd

    SHA1

    01e04d56d6ca61feec44040d4287e8a6260ae121

    SHA256

    50f3d6bf2a63b26f820ef2397751d2584f130ccbcb12055f5af08738012f691d

    SHA512

    d476340e5c27e2b6acea15eefcdb6479014d7aa653a13ab1ab4962ab585a13b5d4a6ee30e302f95d7abbb147c5cd28395c64fb3cb77e764f9990f899b4c406db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24909ffd12d76a2e773fec6581c7fc10

    SHA1

    8997bd35a8bff6bf2cc7811579864f65f6c5b36c

    SHA256

    9df2400009e8ad5d153eda31213a6e69b3af19609bd75c7f4c10039aa5df1957

    SHA512

    c761d494ca600b35bc896101a481febb359d98ac90de3362b6dcbea370cb3ea05d0e194cafb992a9622062eb39598406d35fd8531ab13644cb2f8ec5b399fb26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d23027411397fd3f8f17765fcf7852ef

    SHA1

    d43ff44f0da385e9ae9ca2ef49fb48ba80c1dedf

    SHA256

    376e38c99274d42c4edebb4b4f881e166c2a42d1636b147d5fb971c321759d96

    SHA512

    945dd8cf2254b0dcd82c9475a4b967c1331d4e62a5ecde4e6e62373e093b67e71276d0d2398299646d399fb37ca5c46eb7bb003bf89d4d96c2b64c1ab99ac38d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    457b80d3743699bc5db136086948d0a1

    SHA1

    2b21e2ec7cb650f47c84b4d957624e518310a5a6

    SHA256

    f1e089d1b130770e99268eb79b16de6692d254e9c356f789bc1955b4de6b3298

    SHA512

    85cfec73ba160fcfe1a001b9a2374c70d4122a40bf6379c557225a2ae7543d2e435f79a432f148fab0883bc15cb123e894fd2492436d6a327f173887d5cbefb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aad7beb17bd3f4c15b0cc126335026a6

    SHA1

    914c07d629b8f1c8bce3494cec6ba0f876644188

    SHA256

    3bb444c4c62289cad2c9d68cbf6de67bfc3198d23e300a5badf260a15867d013

    SHA512

    0e50790e34a7ed0901bb9431380e406783a6bb52666afda5e70993fb636f60a2c9b54cbc48dd93b527278ffc3e3b00320cca017e6ad2a21307459543601011ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f8ab5ec2c930fab04afa64adf3e3cfd

    SHA1

    14fa8c60a0e718c9795d008d48643f0eb9520ae9

    SHA256

    dadb9a260abb9f4f1fd61cf7b9158a0b125c9bf03066b4d9471827b30e4f2806

    SHA512

    b89d33f7c048af7612b2d8abc260cec200cc6023b32894bc40a4729fef1c0ff7a0e86d3c0e480509da754108ad09daa0effb49bb9f280c75e1360869dbfc7076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87af948b83386ed62be0bdbcc79a2a15

    SHA1

    c3e8f72fadcb5353bb86de0daa966725f6402d45

    SHA256

    f22abd565e8096b6b644f653ffc17a90389678ed10d987d3e766bda178296581

    SHA512

    6e71f21b535bb16e1ece1f488345222f3161e602815e522b6f1f3aa4fa7c8be50818e5a6c58079bb0d3e0a4afc78ac63f3eafc143f2b864c1cc683013ea15eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    878973fc28f9cd81239eec4f2d0905a9

    SHA1

    7b9a25ddad7614939f4df3d589242acd7049a0d4

    SHA256

    485ae2ca444fb2a1db28f8fdf7aa8ea010f0668aa073f326da2dab26a5266848

    SHA512

    e9a28a1c59d8191fe771933071de7020d59e5a41723ac9d5208fb6ddb07acbe3b6fc3f52951ef291c97cd7ae4c7579643475e6d2b032cdef1d4993ac8077e77c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0c99e9c96b035af099c52ab08338c74

    SHA1

    8ec1e503d63c26430501b885d5cf93e8b4097666

    SHA256

    de9db926cfbe00977483b74f98d91506c5584973156e866d7837f18b3956cca6

    SHA512

    c206fbe1fbcf094aea581cca84ac4b5086c4b9a89e559929c9599420e1dafbd6cbb225200e58ba77b1457b3630ba4315629d49c3e5cb0ee332b9352db5dbb548

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0241d8d10beb5fa27de4684ef38f6a6

    SHA1

    3287b0eedb5fd3c7d828782bc42f839980f814eb

    SHA256

    8e7857b81afda63e8a4fecd13bafb7f85aadeec81ec74bd4101d5095cba86343

    SHA512

    3858905c420c0bf857aabe875088e7c81439ec0114e67859829e94bf0fa7a20c87a872f11ddf3b78e2cda7cd6699ba064dfa5aea6f6a075f3ffd61373d4c0f53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e9958e4d6f1e3afe191a05b45257b69

    SHA1

    bd640871c753a9ba34efb1ad4b29551fd8e4b1a7

    SHA256

    974b18122e2c3be76a4b15d50792716b518904cb9f1584d83c83d89b4c963062

    SHA512

    c8997e11246a4fb6a4f186829fc3790b71fa6c8c7b30a3fba83756c3925225a74f8b26ae862cfa0b4570c86c496292fcf8e3dcb214ec915d6708f60551c71308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd0c0370514e88974c25b5dc169d04a5

    SHA1

    bdaf75c360f22f9f8ae69b20e2a279bc1bc3fe97

    SHA256

    3c1b74a622a921b2d8302bfa9a206be81f2fbd32599c344245f70036abff80f6

    SHA512

    b0c33de2245ba521ad5d33bf7f61c1dceaacfec2052bf25eb27786033f8d9d22785422d122f339522d88f6bcf7a84f62b11e3600d9bc6daa0763c6696ec48329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3122fe6667e5367d30b84cfeeaacb265

    SHA1

    a5aa9d68512c785691c2863c7a1367e756f37acd

    SHA256

    8b40c1a605db1518002de78da6ae298881088bdbf06052ef3b9c8cf2561f8e1f

    SHA512

    384065996d9008b011e3e9ce699b9c577fbdaed123add6f280b6936a9bcc1864d0d3d4ca4d00e9f8145b5fd7084811ad8a1689f8863220d62b9e656d6863391b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b21ed723625f02bbdc7fa88daab2dbe

    SHA1

    49414d8679cfba3423bf07e12c136cde13ae6ba8

    SHA256

    b0cfd1e50e98f4187c5c19531cdaceb08a7b636b873e43e3e29468b5120aa5c5

    SHA512

    359b663dfbe25b1dfc564538259bad55afcf098240061f20d039ba1af05cb33c42ffaf4e40a04bc8b80862ced19b05f722e41688911c046cb5b7602799d50020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce7f6e19927ec7f5bda12ede03bcb44f

    SHA1

    6aa015404f6d040562e5d248c101a226b4605079

    SHA256

    f11b4a709e1d4443d61e8e4869bf2fbf0f231081ea35c7e17e009a39d0d54092

    SHA512

    e31e8dc4bce0c1320070ea9febf4450641c7d985f92f9fb9af46c56fb491656bc7631405790fc2b63f356288238589414174af76413aad66041ad2bbca12fba8

  • C:\Users\Admin\AppData\Local\Temp\CabC286.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC336.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsoE552.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    376KB

    MD5

    e912a6ed3832be1d40f3aa5a925d97bf

    SHA1

    08dccfe1bbe4f104613eb6822aea486812e5e4ee

    SHA256

    2109e062e3fd01c5f578df3c4f881087f0ab41cd287036005b05589e81156d19

    SHA512

    7e17f79fb572d6c449e7a8d37d72b16e3150f2aeaa8a86c1910e65632154e26e7f28070bd4392bfc8fbcfc6ecfb004267f9b374884cf3cd36f647f1c1df71bc1