Overview
overview
7Static
static
3possibly m...7z.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
37-zip.chm
windows10-2004-x64
17-zip.dll
windows10-2004-x64
37z.dll
windows10-2004-x64
37z.exe
windows10-2004-x64
37z.exe
windows10-2004-x64
37zCon.exe
windows10-2004-x64
37zFM.exe
windows10-2004-x64
37zG.exe
windows10-2004-x64
3Uninstall.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3possibly m...P2.exe
windows10-2004-x64
6possibly m...er.exe
windows10-2004-x64
6possibly m...ar.exe
windows10-2004-x64
3possibly m...er.exe
windows10-2004-x64
3possibly m...AR.exe
windows10-2004-x64
3possibly m...ll.exe
windows10-2004-x64
3possibly m...AR.exe
windows10-2004-x64
3possibly m...cp.exe
windows10-2004-x64
7Analysis
-
max time kernel
0s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-uk -
resource tags
arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
21/11/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
possibly malware/7z.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-uk
Behavioral task
behavioral3
Sample
7-zip.chm
Resource
win10v2004-20241007-uk
Behavioral task
behavioral4
Sample
7-zip.dll
Resource
win10v2004-20241007-uk
Behavioral task
behavioral5
Sample
7z.dll
Resource
win10v2004-20241007-uk
Behavioral task
behavioral6
Sample
7z.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral7
Sample
7z.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral8
Sample
7zCon.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral9
Sample
7zFM.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral10
Sample
7zG.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral11
Sample
Uninstall.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-uk
Behavioral task
behavioral13
Sample
possibly malware/AIMP2.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral14
Sample
possibly malware/FoxitReader.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral15
Sample
possibly malware/Rar.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral16
Sample
possibly malware/RarExtLoader.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral17
Sample
possibly malware/UnRAR.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral18
Sample
possibly malware/Uninstall.exe
Resource
win10v2004-20241007-uk
Behavioral task
behavioral19
Sample
possibly malware/WinRAR.exe
Resource
win10v2004-20241007-uk
General
-
Target
Uninstall.exe
-
Size
57KB
-
MD5
881bdc10831f28c0bce53acf1ef5f73c
-
SHA1
18bf74f2307549bf56f87b2d7f916bfa591ae529
-
SHA256
9af958b415f2d359ba086e20b3572762ca900112b6b8ed7bb423c980757ed592
-
SHA512
db820f224c7a5af4c01da783210ce017a3a92a20c1844d2c9327e2a1c5e11a3406b0a3c235b0c88dd4ba9f2fad954f6584de6f03857ed515e27cd631b60edb34
-
SSDEEP
1536:ZCxKWquTniCtK2SkJsqAELVig92w6Sdtcg:ZUjqKPakJrAI0bw6Sdtcg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral11/files/0x0007000000023cee-5.dat nsis_installer_1
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵PID:4896
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s "C:\Users\Admin\AppData\Local\Temp\7-zip.dll"3⤵PID:4668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD599bc22826a0568dce241be3a4ffd0c0d
SHA162e4662250abdf10d23a61076fd7cbd00a5c5b6f
SHA256120e4fac0538b7e7b75934706668063a4e7785d0405dca43fde36d55f6d968de
SHA51235b016b6e2dc850e5432becd57f35faf73b180c0a6f822a406cf9d5439a87126c41c49aac025cdeecd38bbd01705ddbd8c217cb33134e978ecc9624053b52be9
-
Filesize
494B
MD52d751268a67452f19da76c01b5c5c02a
SHA1bbe24c3b8035111c24fb153789f5ddbd39cdc2a7
SHA2561ac42d870e6ae37a3dfdb0d8f59e2705b3bfacdbc65a294e34e0e638490ed800
SHA512e8d384ffa0023e37aac686c7bbe8d584da98906d4916805c099e7cad5f57039fbbe31edb33b7e42b55b79bf566914bd57a9b76f1da67fe8da7cd74db95ea4d6a
-
Filesize
57KB
MD5881bdc10831f28c0bce53acf1ef5f73c
SHA118bf74f2307549bf56f87b2d7f916bfa591ae529
SHA2569af958b415f2d359ba086e20b3572762ca900112b6b8ed7bb423c980757ed592
SHA512db820f224c7a5af4c01da783210ce017a3a92a20c1844d2c9327e2a1c5e11a3406b0a3c235b0c88dd4ba9f2fad954f6584de6f03857ed515e27cd631b60edb34