Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 23:58

General

  • Target

    uninstall.exe

  • Size

    41KB

  • MD5

    f2656f62f52556cbaa8fe63cc51c5d73

  • SHA1

    e1cc49f855bb98996ab49caac77cd015569ac024

  • SHA256

    2e100548df26b77c4bf3a930023daf36173a04b8242fd7d0f7132e352931e4d2

  • SHA512

    e766a0734178530268671432fdcddf22d9913f1eabe964af48d7630dd0a3a8fb9613ea7b3f6ffe9fb3568889d954d2f20c865a0163344cdb55e7419402a0dd1d

  • SSDEEP

    768:6HJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJdJRnSlC9ZnOlb2:6pgpHzb9dZVX9fHMvG0D3XJYlC+Q

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\uninstall.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\avsuite.exe
        "C:\Users\Admin\AppData\Local\Temp\avsuite.exe" /terminate
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\config.cfg

    Filesize

    1KB

    MD5

    44a2b5a5576a107e5b7da70147f30475

    SHA1

    8d243e67374ee2c33e126ead765158a23fd5a813

    SHA256

    99eb9b2619258157be9115700691d441c847df621e871a4deb18a16be4013715

    SHA512

    a5fe6b455cfd4418b8daaa32d711e82bf1e1570822771baced44e7818594c3246504d2068e313d88eb3569996b8c676d6c74325be4a193c81c379dd49b4dc26c

  • \Users\Admin\AppData\Local\Temp\nsdD7AA.tmp\AccessControl.dll

    Filesize

    10KB

    MD5

    055f4f9260e07fc83f71877cbb7f4fad

    SHA1

    a245131af1a182de99bd74af9ff1fab17977a72f

    SHA256

    4209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc

    SHA512

    a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    41KB

    MD5

    f2656f62f52556cbaa8fe63cc51c5d73

    SHA1

    e1cc49f855bb98996ab49caac77cd015569ac024

    SHA256

    2e100548df26b77c4bf3a930023daf36173a04b8242fd7d0f7132e352931e4d2

    SHA512

    e766a0734178530268671432fdcddf22d9913f1eabe964af48d7630dd0a3a8fb9613ea7b3f6ffe9fb3568889d954d2f20c865a0163344cdb55e7419402a0dd1d