File name:

uninst.exe

Full analysis: https://app.any.run/tasks/e7f697ca-e307-4cb1-867d-e375eac2884d
Verdict: Malicious activity
Analysis date: April 17, 2024, 22:34:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

86EF8C2B54DF8B6824D668B4DDFB8FFD

SHA1:

6D8CFAD15F694B1CE4B6293F92516C0B3AEBE301

SHA256:

3FBEF0C86EC0AC2AB8EE07256E1461660FB3CE0CB6B9B149EFDAAF384565F98F

SSDEEP:

49152:ipipBf7dVs6HuXIWK/b6U/xO+EdhVuwVfPn57J2rcmaXIavA6lIV066AGu6WZoUs:PpBJROXIWObL/xOTwwVnnR8ZaXIa4G6O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
  • SUSPICIOUS

    • Starts itself from another location

      • uninst.exe (PID: 548)
    • Executable content was dropped or overwritten

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Au_.exe (PID: 3108)
    • The process creates files with name similar to system file names

      • Au_.exe (PID: 3108)
    • Reads the Internet Settings

      • Au_.exe (PID: 3108)
    • Reads Microsoft Outlook installation path

      • Au_.exe (PID: 3108)
    • Starts application with an unusual extension

      • Au_.exe (PID: 3108)
  • INFO

    • Reads the computer name

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
    • Checks supported languages

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
      • ns1AC5.tmp (PID: 2448)
    • Create files in a temporary directory

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:41+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23040
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x30cb
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start uninst.exe au_.exe ns1ac5.tmp no specs uninst.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
548"C:\Users\admin\AppData\Local\Temp\uninst.exe" C:\Users\admin\AppData\Local\Temp\uninst.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\uninst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2448"C:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\ns1AC5.tmp" C:\Users\admin\AppData\Local\Temp\ReflushIcon.batC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\ns1AC5.tmpAu_.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
Modules
Images
c:\users\admin\appdata\local\temp\nscd6f5.tmp\ns1ac5.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3108"C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\admin\AppData\Local\Temp\C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
uninst.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\~nsu.tmp\au_.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3416"C:\Users\admin\AppData\Local\Temp\uninst.exe" C:\Users\admin\AppData\Local\Temp\uninst.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\uninst.exe
c:\windows\system32\ntdll.dll
Total events
4 724
Read events
4 722
Write events
2
Delete events
0

Modification events

(PID) Process:(548) uninst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
Executable files
11
Suspicious files
0
Text files
54
Unknown types
4

Dropped files

PID
Process
Filename
Type
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Header1.bmpimage
MD5:D2F247DB7C0F418CC3300F12269C5E4F
SHA256:4F9565A0137602B3494500D80BC2B4B94E62F5685A8AE4838575CDBDF4653A8A
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Header3.bmpimage
MD5:2B7DBEA7E3B4AF20DD497161F15050B5
SHA256:B652A16BD8971C92D4F71581A4CC503E4BA41ECAA74E171384D340DC36875104
548uninst.exeC:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exeexecutable
MD5:86EF8C2B54DF8B6824D668B4DDFB8FFD
SHA256:3FBEF0C86EC0AC2AB8EE07256E1461660FB3CE0CB6B9B149EFDAAF384565F98F
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\lincese.bmpimage
MD5:18839F40575F6B2A6C05FEA51B1B60B0
SHA256:A728D1178B5F81DABC631EFBCD4D6EACD260CF677B5772753B713AF7AF847CFD
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Progress.bmpimage
MD5:6F1B8610BC553EE5387D0AE0746E5073
SHA256:A4D2964AC4AF2266055C946BDF1DDF08780E37E71DA8F1929A74F1E398553EE9
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Header2.bmpimage
MD5:DC54A134E0A8021B0B52DC7E1F06073B
SHA256:0D307434E22558391A4A851B28366592CC54FFCA943539BC78CA1AA8984CC0C9
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\welcome.bmpimage
MD5:F647183E67D747619FE964C322F85EDB
SHA256:23AC04979461C8E12248B0BCE47129DB9676E473E2487E9F7B6E653CF095420F
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\finish.bmpimage
MD5:341295E11FB01CFED3AD5E2B0B4B82D3
SHA256:EB1D1CBC5F2D00B53D66804C40EBC04D7338FFE2A9FF53B89B88876A0265A960
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\bottom.bmpimage
MD5:A62EE8290A0F88D309830CD2B53A24B5
SHA256:B5884A6823818BFFDB3D51AF665D73282C8B7173AA3152CC2262B92BC2E3DE5B
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\FindProcDLL.dllexecutable
MD5:83CD62EAB980E3D64C131799608C8371
SHA256:A6122E80F1C51DC72770B4F56C7C482F7A9571143FBF83B19C4D141D0CB19294
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info