Overview
overview
7Static
static
32d9c9ba012...97.exe
windows11-21h2-x64
7language/ind.xml
windows11-21h2-x64
1language/ita.xml
windows11-21h2-x64
1language/jpn.xml
windows11-21h2-x64
1language/kor.xml
windows11-21h2-x64
1language/msl.xml
windows11-21h2-x64
1language/plk.xml
windows11-21h2-x64
1language/ptb.xml
windows11-21h2-x64
1language/ptg.xml
windows11-21h2-x64
1language/rus.xml
windows11-21h2-x64
1language/sky.xml
windows11-21h2-x64
1language/slv.xml
windows11-21h2-x64
1language/tha.xml
windows11-21h2-x64
1language/trk.xml
windows11-21h2-x64
1language/ukr.xml
windows11-21h2-x64
1language/usa.xml
windows11-21h2-x64
1language/vit.xml
windows11-21h2-x64
1libcurl.dll
windows11-21h2-x64
3lua51.dll
windows11-21h2-x64
3msftedit.dll
windows11-21h2-x64
3msvcp80.dll
windows11-21h2-x64
3msvcr80.dll
windows11-21h2-x64
3resource.zip
windows11-21h2-x64
1sqlite3.dll
windows11-21h2-x64
3tlb/desktopcal.tlb
windows11-21h2-x64
3tlb/dkappcal.tlb
windows11-21h2-x64
3tlb/dkbase.tlb
windows11-21h2-x64
3tlb/dkcore.tlb
windows11-21h2-x64
3tlb/dkctrl.tlb
windows11-21h2-x64
3tlb/dknotify.tlb
windows11-21h2-x64
3tlb/dkui.tlb
windows11-21h2-x64
3uninst.exe
windows11-21h2-x64
7Resubmissions
01-12-2024 00:29
241201-as8kssvmek 701-12-2024 00:19
241201-amnnfavkek 730-11-2024 15:39
241130-s34npssjbj 730-11-2024 15:34
241130-sz6znaxmgs 707-10-2024 06:29
241007-g9dkbavcnh 10Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-11-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
2d9c9ba012ae8a50b79ef502e6c7dc05451eacf69c598c54c31c91b9c1623497.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
language/ind.xml
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
language/ita.xml
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
language/jpn.xml
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
language/kor.xml
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
language/msl.xml
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
language/plk.xml
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
language/ptb.xml
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
language/ptg.xml
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
language/rus.xml
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
language/sky.xml
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
language/slv.xml
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
language/tha.xml
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
language/trk.xml
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
language/ukr.xml
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
language/usa.xml
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
language/vit.xml
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
libcurl.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
lua51.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
msftedit.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
msvcp80.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
msvcr80.dll
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
resource.zip
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
sqlite3.dll
Resource
win11-20241023-en
Behavioral task
behavioral25
Sample
tlb/desktopcal.tlb
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
tlb/dkappcal.tlb
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
tlb/dkbase.tlb
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
tlb/dkcore.tlb
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
tlb/dkctrl.tlb
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
tlb/dknotify.tlb
Resource
win11-20241023-en
Behavioral task
behavioral31
Sample
tlb/dkui.tlb
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
uninst.exe
Resource
win11-20241007-en
General
-
Target
uninst.exe
-
Size
416KB
-
MD5
5b3a0aabf9dfda83b5fafe646a056a63
-
SHA1
8d48747e1922d6c670a901ab0771b1cb57117ae4
-
SHA256
343e0dec2324709cbe89630f9c604310e8edbe422e220dcf5fee93ce0dea8f36
-
SHA512
5425b8791c54a20e765205a312d0acc8c862bb2807664b52ff47f0716e27be8799df7964b5c61bae50a6ec83144a004dfc05bfeb41cfe8e148cb0c181ceb8d77
-
SSDEEP
12288:1mJ5sHn/ztd4T/QW0lUCMNpnio+WQgsLQVNf3+olbPY:1mJ5sHn/5de/ZmIP+FgQURuolbY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4444 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 4444 Au_.exe 4444 Au_.exe 4444 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4444 4040 uninst.exe 77 PID 4040 wrote to memory of 4444 4040 uninst.exe 77 PID 4040 wrote to memory of 4444 4040 uninst.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
519KB
MD5eab7fd287509faec84e23cbdc1a709a8
SHA1b6d659af538f7d57bd679e8c7626d470392c4429
SHA2569702f538888f45fca67a1e2c2d7aa46fe42010c1aed5b0f34a51f989347ed9f0
SHA512701f089f55bba49e0a9ba906fafce581693ccc99d445265ec1ea3794a4b5044f1011d90a9214c60dc0ed6be48f4fc4e9882ba07136268f7ebb0156e0b206d15d
-
Filesize
416KB
MD55b3a0aabf9dfda83b5fafe646a056a63
SHA18d48747e1922d6c670a901ab0771b1cb57117ae4
SHA256343e0dec2324709cbe89630f9c604310e8edbe422e220dcf5fee93ce0dea8f36
SHA5125425b8791c54a20e765205a312d0acc8c862bb2807664b52ff47f0716e27be8799df7964b5c61bae50a6ec83144a004dfc05bfeb41cfe8e148cb0c181ceb8d77