Overview
overview
7Static
static
3USBHelperI...er.exe
windows10-2004-x64
7$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows10-2004-x64
3$PLUGINSDI...nz.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3Icon.ico
windows10-2004-x64
3Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ON.dll
windows10-2004-x64
3Analysis
-
max time kernel
424s -
max time network
426s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
USBHelperInstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Icon.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20241007-en
General
-
Target
Uninstall.exe
-
Size
123KB
-
MD5
8e2dd1a931d8163a84602060751b0f1b
-
SHA1
3ed2fd7883ab106738f5dfd1c7b6664e114d090e
-
SHA256
32d4d11c64c7949555fd14afa7732964e145342110c30529211867c1f9c1f371
-
SHA512
30213c8147b320dd439cc66320a830d5ac963c760f0d80b1e87ba7fe0fff5460ad3c0e60cc026af5fcb1611f6654e484fa76f09d881a10f158cd860423694832
-
SSDEEP
1536:FdnREfs9ke7FggdycMgNULeAyN/ZNTNikT/3eCpZ:FdRGsvFggQcMiYeAqN57
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1860 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x0007000000023cbc-4.dat nsis_installer_1 behavioral10/files/0x0007000000023cbc-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 1860 4476 Uninstall.exe 82 PID 4476 wrote to memory of 1860 4476 Uninstall.exe 82 PID 4476 wrote to memory of 1860 4476 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD58e2dd1a931d8163a84602060751b0f1b
SHA13ed2fd7883ab106738f5dfd1c7b6664e114d090e
SHA25632d4d11c64c7949555fd14afa7732964e145342110c30529211867c1f9c1f371
SHA51230213c8147b320dd439cc66320a830d5ac963c760f0d80b1e87ba7fe0fff5460ad3c0e60cc026af5fcb1611f6654e484fa76f09d881a10f158cd860423694832