Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 00:39

General

  • Target

    $PLUGINSDIR/uninstall.exe

  • Size

    11.3MB

  • MD5

    3275f97deebe74d4cbe4aab23720c189

  • SHA1

    db88a1238247226bad0c3b3684bc09a8c7e59135

  • SHA256

    ef1d0a7ede9eeb6966fd6f54821e15a0032e965af96ba9798942d67ae20707cd

  • SHA512

    8f6eadcc900c6352f7a936152d99602924c9efe4e33f64b2d7187865428ddc67f7e228edd38ebb044b575d4e829a8eecc29f1a10d6bfe585427755b24b08e177

  • SSDEEP

    196608:khKNDpw4uLfIZmDTlbu60Q1aBhUamtyoLu7j+062UjrmXdj8DK30YtUSuCKzP:khKnw4uLfRDTFu67IBNCLK2kdgDK30YA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"au-Windows\",\"user_id\":\"9D7A6E3C\",\"events\":[{\"name\":\"Uninstall_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"2.1.0.2\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-G1ZWRJY8K8&api_secret=vT2-CR2mSpKugIO5e8H3pQ""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2204
    • C:\Users\Admin\AppData\Local\Temp\un.exe
      "C:\Users\Admin\AppData\Local\Temp\un.exe" """av:2.1.0" "gv:2.1.0.2" "gs:Official-com" "gi:UA-85655135-16" "an:AnyUnlock - iPhone Password Unlocker" "c:iMobie"""
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy88A1.tmp\nsProcess.dll

    Filesize

    15KB

    MD5

    8205bee74d498724aa5508e93c6d21f8

    SHA1

    2564cc3032e59d538826596a88d80c3d022ef595

    SHA256

    382aad28fa439b18d3d41a4652201c1d1542d73ff756a738c4cee6b75ebeca8f

    SHA512

    67c1e7fcfbc03565ddcd0cde4a91104231b30e0e3edbfe338ba5da76085fe849ea2dea199554dd3b25b90ab9722c30fd22399932463ef4a95e6000fcb5ef3ca1

  • C:\Users\Admin\AppData\Local\Temp\nsy88A1.tmp\un.exe

    Filesize

    11.7MB

    MD5

    d24750b3221c6c773781e262bb117a84

    SHA1

    0d7eede38e541f18115151736395e24f95b9e4f3

    SHA256

    4f31cc76ab71792c4487795bf2f7d2106a9bbbe24b53ac2af6fcefd8c958b319

    SHA512

    7759a88ef3079f8f6e0e0524416ae360df44eb5506e93b9a7f6348546e5249f76ee339de45cf1820db1c44bf5f316a28f2c150c3627ae784f583a2d1c79c7da5

  • \Users\Admin\AppData\Local\Temp\nsy88A1.tmp\CheckProVs.dll

    Filesize

    18KB

    MD5

    5422e399fabd3a344e8dcc807a48637e

    SHA1

    59b0830698b15993671eb0dd43020041c351deb8

    SHA256

    64e6aad5d6628bc743196a42e28df3f8dc71cdf0d2ad4c250bab872d2a3991c7

    SHA512

    9d102954e0d7bb7e69219a14158e410c18adb85d1cca9e269f3955d3fc5e61b23872313b78d16cd6488eaac0f835b233356152575bf130f8ec91e0d481aa1493

  • \Users\Admin\AppData\Local\Temp\nsy88A1.tmp\GoogleTracingLib.dll

    Filesize

    46KB

    MD5

    3a914fc853188765010b73ff99834383

    SHA1

    374b9c4bcc852e42e85aab7b142ecdd80f0c40a1

    SHA256

    5b8cadf540dd47d19b1020bf5c0aca1b6d14d9d875b0a5794b432401c60ee5c7

    SHA512

    1e1a26dcb480cae7dc0fb89c0e8b560206b23b85a6f56458e2019af9c67ca9f942e2c75e78052e4e0eebcfff5e7a3c5eafb5538ba776c0a40b39cafee0bce0e7

  • \Users\Admin\AppData\Local\Temp\nsy88A1.tmp\SkinBtn.dll

    Filesize

    15KB

    MD5

    0325c49a03baf13592272fec2b36968e

    SHA1

    ab10d9f3b420d7192ce6e3ceb953d94b669bdded

    SHA256

    72ddf9ec65f49d38ed181b4e73e095524d9c83118e6d7ae705227c7351300b95

    SHA512

    9009b5ebd7c45ecf9aa967aeddaf6b7695581ee8e212432eeaefd0777df3fbff41842975e0d09774f01b3b994500299042a004efc030162576cca925bdc0f43c

  • \Users\Admin\AppData\Local\Temp\nsy88A1.tmp\System.dll

    Filesize

    22KB

    MD5

    86a488bf743dfab80ff142713adb5d48

    SHA1

    02e4b39f2fa40cd4edcc42cb524dc3ce911bfdac

    SHA256

    3924b57f8993a880d53e1e4e18eb6ba9b5dc610cbb00345c954c7e8a9078c309

    SHA512

    0ed09bcddd5bd13a91e7b99b78e37a01a36d62a29ad74acaacbe0da6446c8523e83ed2c089d2847e4d1ba467da93e2fd2de104feb51bcda445511b334bf932c8

  • \Users\Admin\AppData\Local\Temp\nsy88A1.tmp\registry.dll

    Filesize

    35KB

    MD5

    2e7ced24d47e40e0725e8d80c2d2ba6b

    SHA1

    b74c0fd4d1111bc461558a96720d40adb314a21e

    SHA256

    59120dcdf3315804ecaa8cb76b9cf5ee99f992407f30a11c6df8e23c09294c06

    SHA512

    ba0afcb54ed33265faa45a22ece8ee8f35fe3ee96170bd231e4e11b409330216c95b1a2f360a4d1955c6ef77a45a4c65385047333b2bd46f3e27fbfbfcc19713

  • memory/2496-27-0x0000000003670000-0x00000000036C9000-memory.dmp

    Filesize

    356KB

  • memory/2496-29-0x0000000003980000-0x0000000003981000-memory.dmp

    Filesize

    4KB

  • memory/2720-47-0x0000000072D6E000-0x0000000072D6F000-memory.dmp

    Filesize

    4KB

  • memory/2720-48-0x00000000001A0000-0x0000000000D62000-memory.dmp

    Filesize

    11.8MB

  • memory/2720-49-0x0000000072D60000-0x000000007344E000-memory.dmp

    Filesize

    6.9MB

  • memory/2720-51-0x00000000011D0000-0x00000000011DA000-memory.dmp

    Filesize

    40KB

  • memory/2720-50-0x00000000011D0000-0x00000000011DA000-memory.dmp

    Filesize

    40KB

  • memory/2720-52-0x0000000005290000-0x00000000052EA000-memory.dmp

    Filesize

    360KB

  • memory/2720-53-0x0000000072D6E000-0x0000000072D6F000-memory.dmp

    Filesize

    4KB

  • memory/2720-54-0x0000000072D60000-0x000000007344E000-memory.dmp

    Filesize

    6.9MB

  • memory/2720-55-0x00000000011D0000-0x00000000011DA000-memory.dmp

    Filesize

    40KB