Overview
overview
8Static
static
3csaudioint...er.exe
windows7-x64
7csaudioint...er.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3drivers/cs...42.sys
windows10-2004-x64
1drivers/cs...of.sys
windows10-2004-x64
1drivers/da...19.sys
windows10-2004-x64
1drivers/dpinst.exe
windows7-x64
4drivers/dpinst.exe
windows10-2004-x64
4drivers/ma...7a.sys
windows10-2004-x64
1drivers/ma...90.sys
windows10-2004-x64
1drivers/na...25.sys
windows10-2004-x64
1drivers/op...ec.sys
windows10-2004-x64
1drivers/rt...11.sys
windows10-2004-x64
1drivers/rt...15.sys
windows10-2004-x64
1drivers/rt...82.sys
windows10-2004-x64
1drivers/rt...2s.sys
windows10-2004-x64
1drivers/sk...us.sys
windows10-2004-x64
1uninstall.exe
windows7-x64
8uninstall.exe
windows10-2004-x64
8$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3utils/csau...er.exe
windows7-x64
1utils/csau...er.exe
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
csaudiointcsof.1.0.4-installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
csaudiointcsof.1.0.4-installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
drivers/cs42l42/cs42l42.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
drivers/csaudiointcsof/csaudiointcsof.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
drivers/da7219/da7219.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
drivers/dpinst.exe
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
drivers/dpinst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
drivers/max98357a/max98357a.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
drivers/max98390/max98390.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
drivers/nau8825/nau8825.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
drivers/opengmaxcodec/opengmaxcodec.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
drivers/rt1011/rt1011.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
drivers/rt1015/rt1015.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
drivers/rt5682/rt5682.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
drivers/rt5682s/rt5682s.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
drivers/sklhdaudbus/sklhdaudbus.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
utils/csaudioendpointswitcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
utils/csaudioendpointswitcher.exe
Resource
win10v2004-20241007-en
General
-
Target
uninstall.exe
-
Size
41KB
-
MD5
fce8be84b8763aa8265a3f9b061121f1
-
SHA1
1b718de67d01bf764ee0691a8aaa00870cfab49f
-
SHA256
877627e281ee21e110f816b114e153a83ff501228b0b0f5c4538206071cbe5b1
-
SHA512
2db8c550caf244a7d822872d4526136dafa3b2de01c1093f2538e5b8a5f294ed8dd32391c8aa69187f3606365915bfa8c5cd2dc54e5564db03ed63cb99252bee
-
SSDEEP
768:r7ra/Tl+hs3E/jU0dugZ0T2Xtz+lHQW40Zz0D3jHUpi1GouvJRnlp5R2:e/T2X/jN2vxZz0DTHUpou9p5w
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
Un_A.exepid Process 924 Un_A.exe -
Executes dropped EXE 1 IoCs
Processes:
Un_A.exepid Process 924 Un_A.exe -
Loads dropped DLL 1 IoCs
Processes:
Un_A.exepid Process 924 Un_A.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 3152 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
uninstall.exeUn_A.exenet.exenet1.exesc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Un_A.exepid Process 924 Un_A.exe 924 Un_A.exe 924 Un_A.exe 924 Un_A.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
uninstall.exeUn_A.exenet.exedescription pid Process procid_target PID 4936 wrote to memory of 924 4936 uninstall.exe 85 PID 4936 wrote to memory of 924 4936 uninstall.exe 85 PID 4936 wrote to memory of 924 4936 uninstall.exe 85 PID 924 wrote to memory of 2160 924 Un_A.exe 91 PID 924 wrote to memory of 2160 924 Un_A.exe 91 PID 924 wrote to memory of 2160 924 Un_A.exe 91 PID 2160 wrote to memory of 228 2160 net.exe 93 PID 2160 wrote to memory of 228 2160 net.exe 93 PID 2160 wrote to memory of 228 2160 net.exe 93 PID 924 wrote to memory of 3152 924 Un_A.exe 94 PID 924 wrote to memory of 3152 924 Un_A.exe 94 PID 924 wrote to memory of 3152 924 Un_A.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\net.exenet.exe STOP "csaudioswitcher"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "csaudioswitcher"4⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
-
C:\Windows\SysWOW64\sc.exesc delete csaudioswitcher3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
41KB
MD5fce8be84b8763aa8265a3f9b061121f1
SHA11b718de67d01bf764ee0691a8aaa00870cfab49f
SHA256877627e281ee21e110f816b114e153a83ff501228b0b0f5c4538206071cbe5b1
SHA5122db8c550caf244a7d822872d4526136dafa3b2de01c1093f2538e5b8a5f294ed8dd32391c8aa69187f3606365915bfa8c5cd2dc54e5564db03ed63cb99252bee