Analysis

  • max time kernel
    118s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 01:34

General

  • Target

    Uninstall.exe

  • Size

    43KB

  • MD5

    4bbbf32667e8d9aca25b74536c022802

  • SHA1

    128ce5fb0d058cc9126da94a2f9799b2275dfa22

  • SHA256

    df3a520beb7b22566981849512cfba209d108d65505b49f38ad054aad9940c17

  • SHA512

    5a850f7d6ef5293aba4594370eb59116d78b31f07f663dfc737bb35992e8c2fc351935f30af512f319af5f26f0538029624b442eca00a9f00409a23f263d9d72

  • SSDEEP

    768:B/UpAHiGjRQ1kkjH918xnyzOp7OssT1pF/O71mJ/alqWXpQ/5o23bA5FPX:xUeHiWRgkkjH8nyWmJ3WXpC3M5BX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ardamax.com/keylogger/uninstall.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de0ef8ed2a29434a4a8ad2a86603d518

    SHA1

    249269820bd3a5ce47fc142461d58c70988d3df6

    SHA256

    3d87aa6c9c8a4454984a169dea1842cfed250d068759166d53ddf29be23a0c04

    SHA512

    ed144356b8d9d5c4a67610a8719aac4e205f3cea44717c5841fa5ab41933206e65f1ff878dd76f74bde10facacf1550207302e708519991bbe887f2ea7c9b291

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65fae79922503ea38fd040dad3c132f

    SHA1

    7fba16c341c240dd48192cbb9e83324846756a54

    SHA256

    56de56b284d412d4a298b768e6cb34e270d8161fa27a363121deb49ae748379c

    SHA512

    2dad16f3acb9aa0b0588baeb63a0029c88ed99556854e311b0797b0fbac569017ad3d11bcbe0974e611cbf1aaac84f4b164cdb5cc968825babc3d2f0858a6772

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74b72f5e1e4372c4a8422e2e30305b3d

    SHA1

    2174ef93899784f114da64387f596bf06f4188ec

    SHA256

    d28f073a6636b189bb64e2ef4c34c276796701ae331c23cd8931d8acdef3b96c

    SHA512

    62323a3533599f026bddc36fa60118801de19b5231fe94eae179e3c2f43298537c1e5deeaecb0d5a04aaf36c367aeeb86798da897e372cdc41de12bccc382c2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7576f424d67da765715e038943069f24

    SHA1

    9815efa7b9aa4cd95b1ae642675778c7c2e5e0c8

    SHA256

    55283912e1e9cef5acba2553e46f0af8888e00fe663ff55ae2c0f3cf1d15bfb3

    SHA512

    eeb9649e6c60fefd7d778545f576d6746e5481c1c433046b701da9690d2bcb84affc02a8d34d7303de294a439cd30c8822ecb4e06fa4e6eb317e5292c1481943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f91137cb4b83e24d65fb73a15f89d58

    SHA1

    0fcd81a13799caf2d96d9254e308853b20fe355f

    SHA256

    ee160dd59e67e1b2fc26e2d58b1af191963b25893541eeed59fa4e597fe1a674

    SHA512

    8335ceea89e40a7e5ec48f19645b3c24a3803a6501d025ca09d8205efc58feb5bdbc023a773649096cbe15854491af05d5c7d8f3759d6a818a5a70f997f1c0ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee31aabfbf8da00ecd26ae7c7cc935c4

    SHA1

    eb95bae256c4b5e426aec084ce26935c183e6120

    SHA256

    d6a7e77676fb43e34d334e805ddfbb524f6947800279f63ddd8a7fad6c821ba1

    SHA512

    887069d13d5fc2e8aa92979621385f4d78b99743718c29a4c79f30eebd207893d63961281e490fb70870369c32ec1d482d784944df62a97388b97026ed2178fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46b8740d592196dc3a6208cc2096805c

    SHA1

    187828c9d8811590e98f66cc1f5afbbfd86734aa

    SHA256

    5e565317ba3d40a45e0e2e09052fc58d97d46370dba4e1a0447a0414e8d8326d

    SHA512

    8ad6454f603c0e3826905007298a36fa0a3a103f6d7b8564cb964a49d7e694d6abbd67fb22b92fb33ff73767ff31011a34ca7b1d73ac7dac5ec0c187b1387383

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73219b26c41b9a14220242f8476ba5bb

    SHA1

    afd0d244f790731171a7ffbaf26e214b82381ea8

    SHA256

    80971c4ae0844fb7c5b4e93e11232a9e23826f4f53856f248a7a5c62fab5d79c

    SHA512

    5018d8dd1e49d02f99eda55e7e6b9e614da473f655a3ee6bb3077c63b4ca28152444342f3dd764df4ce0d0ea9ad72d4ec78c01c5de19e47d7fa2454079e159e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13bd7c777b428425344f5d22bc72855e

    SHA1

    76d10bc14f09548a9c6e918b0f9e754c62f8d900

    SHA256

    849f274ff68fd5ee27e6e208cde46114e7b0332f568fa81f9a6342752260644a

    SHA512

    7ecd1859f7851ef17e6c9982cf4e5901e831abf39fea804a74de2ad4b5444c89c5831989622872bfeadf744895d62ff4c2caa8e2ca26f495d323800ed19517e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abf884b293936ad3cb6c413bf2720729

    SHA1

    51ddd50f82f3210eebff5d73053b2a48f543f020

    SHA256

    1a18a54e43163140f8851eccdc320133cbc7421b1332b2e7b88decdd48497cd2

    SHA512

    566eb2d05b5e5dc1bb67e448cd4c7dd86616a16707efcef028ab5b894bd79f668ad57211df20b8ff313d7adf326a1ac4e93fd01330c0745c5548d018a922a7c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6877889cfa6f2df77e41b2b46b93b8c

    SHA1

    385dce3515cc36dda9a2aa8fa95ac0dc7e9fff09

    SHA256

    95e0beca31642eaba67b4e9cf7c7af6b145439801aa4134c9351e682741dc9d9

    SHA512

    cf52cf62a55e446af6aaf7d93863e82826d3760a81020f5e9b8e68282637b4a63f4afdbd45855037c76c3e05baf7a58fb701310285754aa369b40b032cb5fed9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c996737a7d61e6c89d82eae7b23f667e

    SHA1

    dc97af1f46e4d3cb176a9a9172941c10e2c8fe13

    SHA256

    4d5edc012059cb659d56d331e0bff6eb84a6dfda51019fba7ec53bce5e6da252

    SHA512

    2fda7027816596b119dd0fd132d083ba5dd3d7d53713a48384c653175a5d6a5f0b5c5d4e7e821adf2f57894aec49eea915fca43419026a78e73241368db90074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2c4f994d2d749bf6c2dd4168e094984

    SHA1

    c5f3a7441d3405145ab047c3614b8e31ac03b2f9

    SHA256

    71f33db8d8707c3388ade8a144e3062d7e601bc88d7a58dac6597d7fb9419acc

    SHA512

    7576df1d604e38e21a097df9526b573e7a97ac069ea06e3754034bdd8bb856ab951fce22033c7452b5a6cc1f684d2b297988cb6d6d5a732dbcb42c92d03935a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c8802ddea54928759bd33343729cf97

    SHA1

    65d67f5abff85dda7e7193b1e50b411bdcfa6829

    SHA256

    f96cf29815cc18aa51b3704e51572dc7834657a995c97dd45dc6084a7b40589d

    SHA512

    ab25edbf921a99d42f93326bf7472876f8e66f5a3216a4df403e9e78a1803ca99394105371864ddc9992c0b04c3ac25df6e76457f9fe52ef43880b17db9ae2cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb2029b0adb40b6566978bba17821ea4

    SHA1

    7ab487c3dbde65a4c6edfafe264a493b3fd4916d

    SHA256

    419dad44f42745c2cc25212b183c5c6cd7b47dab6d1d98e024cc2e57c8eb0b39

    SHA512

    ce90f9870429f44403c6445d54055026aa5efc3e7bef8084ede74c4da850a48a43224be853839e5b18213c5b21d962ba7716239c63aa27ca7d992a1b62c9e46e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0dc2aeb4cf923d1f5ea6d761d7ac967

    SHA1

    999ac6ae03210ab1ec6944c015c6279535a28a5d

    SHA256

    d205195d4787d82cf95988aad7f681ebad03d245f62e85110aefb2a79763f63a

    SHA512

    80a8a87188971c7503ae22652904e51d06c4af8549e26d199c672a7e50cf28b84df96412dea763c3420777495e492a3302b2785ed981b6061e08f760a2ee5670

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84fbc4d64e32696a5229f9e3942addbc

    SHA1

    810638ae1aa6beb01ba21500cc7498f8b215895c

    SHA256

    9655055ebe55201b604e883acd452d623b5d04948ea70e60ee139eefcfbc9597

    SHA512

    1b4ab07c96b0730e489eb9f45dd9e376d7ee2fce3420e5e2d447c4bc095170bd675333a312d3c1625b02661a5e4a46eef49ecf63009848958c19643e47dc1540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ddbc54b46571fe2227d3fc2c8be649

    SHA1

    e8340f732bdebe4d20e6a501206b08a07ca8e019

    SHA256

    b9dc8cb524e484bd80e4a3b6e349c72deb371146ed14c95cdc782c639a45c941

    SHA512

    a6d0edb4d773ed31c27176bb315cd26ee3933b4ac1034ce36746480ca84e37f4b55e34fd1d9d202ae0c53ef839404385418a1d8b9327b4a395a1bab1b7b7ecc6

  • C:\Users\Admin\AppData\Local\Temp\Cab12C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1EA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    43KB

    MD5

    4bbbf32667e8d9aca25b74536c022802

    SHA1

    128ce5fb0d058cc9126da94a2f9799b2275dfa22

    SHA256

    df3a520beb7b22566981849512cfba209d108d65505b49f38ad054aad9940c17

    SHA512

    5a850f7d6ef5293aba4594370eb59116d78b31f07f663dfc737bb35992e8c2fc351935f30af512f319af5f26f0538029624b442eca00a9f00409a23f263d9d72