File name:

uninst.exe

Full analysis: https://app.any.run/tasks/e7f697ca-e307-4cb1-867d-e375eac2884d
Verdict: Malicious activity
Analysis date: April 17, 2024, 22:34:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

86EF8C2B54DF8B6824D668B4DDFB8FFD

SHA1:

6D8CFAD15F694B1CE4B6293F92516C0B3AEBE301

SHA256:

3FBEF0C86EC0AC2AB8EE07256E1461660FB3CE0CB6B9B149EFDAAF384565F98F

SSDEEP:

49152:ipipBf7dVs6HuXIWK/b6U/xO+EdhVuwVfPn57J2rcmaXIavA6lIV066AGu6WZoUs:PpBJROXIWObL/xOTwwVnnR8ZaXIa4G6O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Au_.exe (PID: 3108)
    • Starts itself from another location

      • uninst.exe (PID: 548)
    • Executable content was dropped or overwritten

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
    • The process creates files with name similar to system file names

      • Au_.exe (PID: 3108)
    • Reads Microsoft Outlook installation path

      • Au_.exe (PID: 3108)
    • Starts application with an unusual extension

      • Au_.exe (PID: 3108)
    • Reads the Internet Settings

      • Au_.exe (PID: 3108)
  • INFO

    • Reads the computer name

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
    • Checks supported languages

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
      • ns1AC5.tmp (PID: 2448)
    • Create files in a temporary directory

      • uninst.exe (PID: 548)
      • Au_.exe (PID: 3108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:41+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23040
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x30cb
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start uninst.exe au_.exe ns1ac5.tmp no specs uninst.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
548"C:\Users\admin\AppData\Local\Temp\uninst.exe" C:\Users\admin\AppData\Local\Temp\uninst.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\uninst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2448"C:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\ns1AC5.tmp" C:\Users\admin\AppData\Local\Temp\ReflushIcon.batC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\ns1AC5.tmpAu_.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
Modules
Images
c:\users\admin\appdata\local\temp\nscd6f5.tmp\ns1ac5.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3108"C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\admin\AppData\Local\Temp\C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
uninst.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\~nsu.tmp\au_.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3416"C:\Users\admin\AppData\Local\Temp\uninst.exe" C:\Users\admin\AppData\Local\Temp\uninst.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\uninst.exe
c:\windows\system32\ntdll.dll
Total events
4 724
Read events
4 722
Write events
2
Delete events
0

Modification events

(PID) Process:(548) uninst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
Executable files
11
Suspicious files
0
Text files
54
Unknown types
4

Dropped files

PID
Process
Filename
Type
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Header1.bmpimage
MD5:D2F247DB7C0F418CC3300F12269C5E4F
SHA256:4F9565A0137602B3494500D80BC2B4B94E62F5685A8AE4838575CDBDF4653A8A
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\welcome.bmpimage
MD5:F647183E67D747619FE964C322F85EDB
SHA256:23AC04979461C8E12248B0BCE47129DB9676E473E2487E9F7B6E653CF095420F
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\SkinBtn.dllexecutable
MD5:E4EC95271FF1BCEBAB49BDFED6817A22
SHA256:EE1C06692A757473737B0EBDEF16F77B63AFAC864D0890022D905E4873737DD6
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\finish.bmpimage
MD5:341295E11FB01CFED3AD5E2B0B4B82D3
SHA256:EB1D1CBC5F2D00B53D66804C40EBC04D7338FFE2A9FF53B89B88876A0265A960
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\button1.bmpimage
MD5:9460C477FE8C46C3B276C2E744E2F1FA
SHA256:A38978ABD72EE39BB44CC2F913ACED2DB892A02065BB0CFE58ECFDBE2BB406B9
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\ProgressBar.bmpimage
MD5:0105A1C13322AEE66C631CE4C030FEB6
SHA256:57029E1E650EB381EFC54D9B7D54384968ED81B4C8342A58260B309E328AA999
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\unHeader.bmpimage
MD5:A0ABF30C57141841190892666650FAB8
SHA256:9A89524267D96D9EF3A57338F475C7A27AD07E6FEF5AD1AECAB50C2BF16D4B54
548uninst.exeC:\Users\admin\AppData\Local\Temp\~nsu.tmp\Au_.exeexecutable
MD5:86EF8C2B54DF8B6824D668B4DDFB8FFD
SHA256:3FBEF0C86EC0AC2AB8EE07256E1461660FB3CE0CB6B9B149EFDAAF384565F98F
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\bottom1.bmpimage
MD5:A2C91B2106911E43E6ABBFAC05483168
SHA256:B3DCA2911EB311E6DE89E8846A20495FAC2952D8DAF8FD058BAA9353B619491E
3108Au_.exeC:\Users\admin\AppData\Local\Temp\nscD6F5.tmp\Header1_en.bmpimage
MD5:A03F31712C67DB1B04B35514455560CE
SHA256:42979C5824237E58D245C7A6EB8C530995AB2B0128A54E1BC61D27E9175EFEA1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info