Analysis

  • max time kernel
    1792s
  • max time network
    1425s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-de
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-delocale:de-deos:windows10-ltsc 2021-x64systemwindows
  • submitted
    17/11/2024, 11:38

General

  • Target

    uninst.exe

  • Size

    39.5MB

  • MD5

    ae3addc133bde6ace1d14e236df9dddc

  • SHA1

    a2f20faee685abef6b2f678d926c421f812d3d88

  • SHA256

    683c65d550489f2e0b336e93b6fea6720899051d90b90af9cadc049f237d4fa8

  • SHA512

    7217c73d18afd071aca8c913d891070e41c88085abc50292db0440ed88e302be559e897157394b55889077adea71d157db4298f6c349cc0dfd3da4a4ebf461cb

  • SSDEEP

    786432:HSVV95c2UClQzKnYKCOGp4t9ENvEMaCnK:Hx2UCKz+829YcQK

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 26 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3888
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic diskdrive where index=0 get SerialNumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4880
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic cpu get Name
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic cpu get NumberOfCores
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\KRPlugin_aki.dll

    Filesize

    16.4MB

    MD5

    6d9b3c70056c3af44c29a2f021d093a9

    SHA1

    b52445c4dd67bb7cc6857be1cf1f1d5391d31dc5

    SHA256

    e42222fee2388cbc4814ff5b4d05e6a2f1a602a06352409a1f62cc718526bb2d

    SHA512

    cfaed8b105a8d2eac8bf8c99787c9cc48f9fae401530dfae266f6cb1e2660e9ffcaeaab5dec0292a0136d01c90eaaf81ffa235dbe73f931fb484e3e3fe8008cc

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\Qt5Core.dll

    Filesize

    4.9MB

    MD5

    1849ef00f2b0d4bb8c475df4d714b8ff

    SHA1

    10bd730411fe8c6c3fa75994763c542591fbdd72

    SHA256

    fa6c28d6fc6e319f9c6348541cf8803ee5d32e6afccb666b3c67a54c50c81ba3

    SHA512

    c41794646549b5d7c22ee0cbdcff78450476f965bbf6cb83d07d97a2e23c5c2085366deaad62e37e0cc3dc072ac9e15bf40b39cf20e22a0980dfcae318f35136

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\Qt5Gui.dll

    Filesize

    5.2MB

    MD5

    0906103e25f7349766fc6025c491aa5a

    SHA1

    350589ec1f12ba5f65afc263c10243e10a362287

    SHA256

    ba869785c14c4ace0924c123295a503a59cf90cc4da68e0c61c47187b3754fe6

    SHA512

    ab28b7c562a342c8cbc1dad5290c2c9d2e0678de871f8ae71163fdc6bd7458084481f84baeff3349f9f79c5f07fa3e20cea4553b163fcbec75709ddf599b808b

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\Qt5Network.dll

    Filesize

    1.0MB

    MD5

    11c016d03aefc9e124828cb7cd775cf3

    SHA1

    cfdcf0bf5834e507cf87c7e283d14a7c89aa2628

    SHA256

    10fabe35ca0b0b9c35c2f618c801fb999bde09572a7fa10415b2b3f6b6470a7d

    SHA512

    87cc26fee8033ce638828fb773f62704f48a20c042faf70c9f97e9f1d76a09e6060c818ad2d4cd6cccaf4464fb23e9bcfc77d53a6f24415aa0d83455260ce36d

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\Qt5Widgets.dll

    Filesize

    4.4MB

    MD5

    07b30ed72326c030aae212224034bf28

    SHA1

    13283d6bd5e953a298ea2dd095bedb239dcd7961

    SHA256

    fae1cbde9e10955e8b0ff414e64020be20bf9d1d62e7c583b4510b60f363faf0

    SHA512

    228bf5d5adac1e6fb8eb4cdc75d60f44d1c81c2e5f44d1f04bb3929a06fc2ebbe33bc634a90d593d5892f75121d96a680fd988cb0b462bed82db7183c936fbf4

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\System.dll

    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\imageformats\qgif.dll

    Filesize

    35KB

    MD5

    e070dbf1a9253bde7910e040dfd5d4bc

    SHA1

    43f396528d643bd2c9fd8e1b63c4151bbb23c980

    SHA256

    7ac66b0c813585b7cd3645ad3bcab0b225006cee9076b05a21cb6b8db176462d

    SHA512

    317af40137f8f1d475349a926067bfb6b776c0e26352e164d6cf1fa95293b865ca6e07cf3cb305eff122c1033cd3cd7e2931b8c0083424ebc91be111d6b89a8d

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\imageformats\qicns.dll

    Filesize

    43KB

    MD5

    d617d449bff841e9e56ae5d66733c1f0

    SHA1

    57f9104c906d88b5193475286b9a1e9d55cd3fe1

    SHA256

    3587d149b774835aaebf9122945d432cb97a01f923c2bdf45c8ddf7db46fde6f

    SHA512

    1b4f7be9b650aa5658dde24da392262055b867525f8a2e61a2656c2617651f29dc5b61dd41f57ba84be030616d2060185f4790c7dd4a29d07b1e62af16b7f565

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\imageformats\qico.dll

    Filesize

    35KB

    MD5

    77b5eee567d88078024e3b535d6196f1

    SHA1

    db155287e3a3fcff2d280b5a4aa555784c2bea91

    SHA256

    ae2d373da197c94fd6aff5b56baf3df754722926af4f71279688ce563fe6ef31

    SHA512

    811b1654a0b17eada09e37d4d29a3297d5aaf9f2eae1f3cf48cb6b7c5d36f28450ca80084aec94765bee0b02c03854c3e489327911de9d96f8189a6e92c6648c

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\imageformats\qjpeg.dll

    Filesize

    383KB

    MD5

    1f8c4a04573e26286ee2fafdf03f8f85

    SHA1

    b3d3ed2615d63ea26ed035ad191164e0297f088f

    SHA256

    18706a0bff940116731de4a55d8312c054771271c49fe47f77e07b0d73529053

    SHA512

    699c66b862675ef4e519e962bc8ffb87536fe81f5870f91f4179d9dd34c222e9107f92fc3e6138a8ed005293f90fb993144f4eaf9ab1518072718b730d1dd91f

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\imageformats\qsvg.dll

    Filesize

    30KB

    MD5

    7ba0979da56479bd964810e8ce794e9e

    SHA1

    68465868b7f9e944c6d5c57e4bc1d9383e234a74

    SHA256

    099eef1d161e9c4bb957d73678d471cc276337233a8e715e181a352760346701

    SHA512

    31edacc55c659571b473ac41041bd2779fcb36576882f9250790a7a5419cd64271560f5bf9039cb49ef621e970b2db028cca653ac8e83696e5b7822f6d287400

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\libcrypto-1_1.dll

    Filesize

    2.4MB

    MD5

    e879fa16f3746a14cd46dbc514452eea

    SHA1

    ba9559dca54da672a81cfe711004b25259fe8cf4

    SHA256

    e8a549275b205df98c33d76c47d2476ea57d14ed476d759fc921357a05ab740c

    SHA512

    274605fc33e77d6e891f070e09a00d65bea4aebd28506d3d4b036cf4436ab29a29fce887f0091080027529f7848b84625fffeb13b7e32d3c5472995da16a6a97

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\libcrypto-3.dll

    Filesize

    3.5MB

    MD5

    3b4dce9348385fbb3dee25e3e0db7efb

    SHA1

    f760a89a8bbeff22d3a837ee50089a616c9e247d

    SHA256

    b99f87138165561775b29283879722333082c5f12f4716ee423da880aefc9fb9

    SHA512

    dac1a728dd9388120b05ec79bcc6005a1a50f28a4051500acca24217e9efccec8529e377537d6bc5f6cc9a87a1aa3e5ce7206a04b5283848499f5f46eb8ca800

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\libcurl.dll

    Filesize

    460KB

    MD5

    fe5e6aecb98bbcb2cb0e826526dea007

    SHA1

    936f0e2ade5a909e714c307c1e2aa2702f1e464c

    SHA256

    ec5f18199dc57130082315bfb6baedb8614da92ae256019a30b5880dded9ae47

    SHA512

    7ae9fa473e612791a606f6fd7043a5385b3b4eb3bc612652c05d8520d2b2f766232c03de436636362c60b08cbdfec919a35dc07075b2877753ca4779c9cdf0d1

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\msvcp140.dll

    Filesize

    439KB

    MD5

    5ff1fca37c466d6723ec67be93b51442

    SHA1

    34cc4e158092083b13d67d6d2bc9e57b798a303b

    SHA256

    5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

    SHA512

    4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\platforms\qwindows.dll

    Filesize

    1.2MB

    MD5

    f52d1908e2d1f5b03b72cc87df48c8ad

    SHA1

    aa50aa22dbe42f20e0f67f2102cb37eb39d86dc6

    SHA256

    60085c5b61554a1e9d96350f039597a1b77a7576a81a12a24ace9de4c323bb8d

    SHA512

    70a67a052c4daa445ca200768f9675ebbc987d86efcdef8bc6b35fbf8b907c4dd48bcde890476001bdeb655606fe00a804de7f5d1b08505bcf7883a5326aa0b2

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\sqlite3.dll

    Filesize

    1.1MB

    MD5

    b8074421d9f92adb9d112b90a54d47d1

    SHA1

    97eecbb5adb3d75d7ba791fc8625611e8854ee6e

    SHA256

    8ce20d2f27c6574dcaed648971778bb11d1ec18b9a44e879c0e53c1a29273dd8

    SHA512

    bef2881cd618c7a8a5871e6f58032ae81225f02bd005355d00ef6b05c30e2a8112763ec1cb0474f1f3fb93d43b8609070d0daf33f0b9fdb92196e1c5fae4213b

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\styles\qwindowsvistastyle.dll

    Filesize

    129KB

    MD5

    cea2589b96f6a9f02fccc0bc0786965f

    SHA1

    dc115c308579d59f31346b3535fbc3e0338e0dd8

    SHA256

    a0b0177a40b1c74ac79bf31c9f26ab0770d54c2297d68a53d289c48ff5b23edb

    SHA512

    7865d1ee088cc880670bebb90ed13f5bb55b14affc98dac1ff9bdfcc94aacc84b1379dedcd1ffc992b8f45df40434bdb1c3a3e396410f2f292fd9c83d7d2c338

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\thinkingdata.dll

    Filesize

    294KB

    MD5

    e295bbb7c68f5cb535d72983227b12cd

    SHA1

    d42a6214e46e95f082426f52af52ddbe46725a12

    SHA256

    e988ebfb5798d712ca21fb8986c06a364b1d1f3b9397277898bf2e80b5818e2b

    SHA512

    a84ed487c75b012cd863f044865c4fb9e7cffe354737176f9626ac027d843c763be5668391219c7019fcb419267393f4dc5244020c953cf9ecdf4a68fb67b9f4

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\vcruntime140.dll

    Filesize

    78KB

    MD5

    a37ee36b536409056a86f50e67777dd7

    SHA1

    1cafa159292aa736fc595fc04e16325b27cd6750

    SHA256

    8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

    SHA512

    3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

  • C:\Users\Admin\AppData\Local\Temp\nsyC1AB.tmp\zlibwapi.dll

    Filesize

    469KB

    MD5

    5b56b325dbd6a7284d2ecf09d4cc0623

    SHA1

    38c86384096b428f127117fe58284a03f5f09fc1

    SHA256

    14aca2bf23b47996f630a1c5175fa6003e5898612411eeb6cad5abf96bc27b8c

    SHA512

    3d5d7bf4196ffd20b1a6e747ebd0dd7f2ab83458b4360d2c003e306fe1bbf5de48ddae2404fcf297deef06ae9acd0067314e1abef8433735776805e9b1093d88

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    39.5MB

    MD5

    ae3addc133bde6ace1d14e236df9dddc

    SHA1

    a2f20faee685abef6b2f678d926c421f812d3d88

    SHA256

    683c65d550489f2e0b336e93b6fea6720899051d90b90af9cadc049f237d4fa8

    SHA512

    7217c73d18afd071aca8c913d891070e41c88085abc50292db0440ed88e302be559e897157394b55889077adea71d157db4298f6c349cc0dfd3da4a4ebf461cb

  • memory/3888-124-0x0000000061E00000-0x0000000061EF8000-memory.dmp

    Filesize

    992KB