Analysis

  • max time kernel
    0s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    21/11/2024, 10:59

General

  • Target

    Uninstall.exe

  • Size

    57KB

  • MD5

    881bdc10831f28c0bce53acf1ef5f73c

  • SHA1

    18bf74f2307549bf56f87b2d7f916bfa591ae529

  • SHA256

    9af958b415f2d359ba086e20b3572762ca900112b6b8ed7bb423c980757ed592

  • SHA512

    db820f224c7a5af4c01da783210ce017a3a92a20c1844d2c9327e2a1c5e11a3406b0a3c235b0c88dd4ba9f2fad954f6584de6f03857ed515e27cd631b60edb34

  • SSDEEP

    1536:ZCxKWquTniCtK2SkJsqAELVig92w6Sdtcg:ZUjqKPakJrAI0bw6Sdtcg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:4896
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /u /s "C:\Users\Admin\AppData\Local\Temp\7-zip.dll"
          3⤵
            PID:4668

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsuAA9A.tmp\InstallOptions.dll

        Filesize

        12KB

        MD5

        99bc22826a0568dce241be3a4ffd0c0d

        SHA1

        62e4662250abdf10d23a61076fd7cbd00a5c5b6f

        SHA256

        120e4fac0538b7e7b75934706668063a4e7785d0405dca43fde36d55f6d968de

        SHA512

        35b016b6e2dc850e5432becd57f35faf73b180c0a6f822a406cf9d5439a87126c41c49aac025cdeecd38bbd01705ddbd8c217cb33134e978ecc9624053b52be9

      • C:\Users\Admin\AppData\Local\Temp\nsuAA9A.tmp\ioSpecial.ini

        Filesize

        494B

        MD5

        2d751268a67452f19da76c01b5c5c02a

        SHA1

        bbe24c3b8035111c24fb153789f5ddbd39cdc2a7

        SHA256

        1ac42d870e6ae37a3dfdb0d8f59e2705b3bfacdbc65a294e34e0e638490ed800

        SHA512

        e8d384ffa0023e37aac686c7bbe8d584da98906d4916805c099e7cad5f57039fbbe31edb33b7e42b55b79bf566914bd57a9b76f1da67fe8da7cd74db95ea4d6a

      • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

        Filesize

        57KB

        MD5

        881bdc10831f28c0bce53acf1ef5f73c

        SHA1

        18bf74f2307549bf56f87b2d7f916bfa591ae529

        SHA256

        9af958b415f2d359ba086e20b3572762ca900112b6b8ed7bb423c980757ed592

        SHA512

        db820f224c7a5af4c01da783210ce017a3a92a20c1844d2c9327e2a1c5e11a3406b0a3c235b0c88dd4ba9f2fad954f6584de6f03857ed515e27cd631b60edb34