Analysis
-
max time kernel
17s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/01/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
CableGuys HalfTime v1.0.1 CE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CableGuys HalfTime v1.0.1 CE.exe
Resource
win10v2004-20220812-en
General
-
Target
CableGuys HalfTime v1.0.1 CE.exe
-
Size
2.6MB
-
MD5
9662e049261faf75803b20dd765ff2e4
-
SHA1
30fd361e29864f87656a0c233cb78d8f7ce501bc
-
SHA256
aeac18c433de1a62b6b9106a9424028d4c2731d3f7b378088e7b305213432a42
-
SHA512
41baffa4285d4b534e40888289aaa4696936f596188724899dd67b70f570b7f36f4ad751cae5c3252eb7ea14fdaee4012fc061b88ba942eef046b8d415dc03e0
-
SSDEEP
49152:IJC9tcNqTDY7VgeHFXAsKWUfpI5tExMmlEAl7951RIb:gUTDYX+sKjf3xREAlTIb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1520 CableGuys HalfTime v1.0.1 CE.tmp -
Loads dropped DLL 4 IoCs
pid Process 1516 CableGuys HalfTime v1.0.1 CE.exe 1520 CableGuys HalfTime v1.0.1 CE.tmp 1520 CableGuys HalfTime v1.0.1 CE.tmp 1520 CableGuys HalfTime v1.0.1 CE.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\CableGuys\HalfTime\is-B499O.tmp CableGuys HalfTime v1.0.1 CE.tmp File created \??\c:\Program Files\Steinberg\VSTPlugins\is-F7BQS.tmp CableGuys HalfTime v1.0.1 CE.tmp File opened for modification C:\Program Files\CableGuys\HalfTime\unins000.dat CableGuys HalfTime v1.0.1 CE.tmp File opened for modification \??\c:\Program Files\Steinberg\VSTPlugins\HalfTime-64bit.dll CableGuys HalfTime v1.0.1 CE.tmp File created C:\Program Files\CableGuys\HalfTime\unins000.dat CableGuys HalfTime v1.0.1 CE.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 CableGuys HalfTime v1.0.1 CE.tmp 1520 CableGuys HalfTime v1.0.1 CE.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 CableGuys HalfTime v1.0.1 CE.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27 PID 1516 wrote to memory of 1520 1516 CableGuys HalfTime v1.0.1 CE.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\CableGuys HalfTime v1.0.1 CE.exe"C:\Users\Admin\AppData\Local\Temp\CableGuys HalfTime v1.0.1 CE.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\is-MM13R.tmp\CableGuys HalfTime v1.0.1 CE.tmp"C:\Users\Admin\AppData\Local\Temp\is-MM13R.tmp\CableGuys HalfTime v1.0.1 CE.tmp" /SL5="$70022,2282693,199680,C:\Users\Admin\AppData\Local\Temp\CableGuys HalfTime v1.0.1 CE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5479f7525b7b3e85a15e56a1498d0e20d
SHA1b23fce8cb23b66d226ac6583bbe2a441e66cc9c5
SHA2566f5afd6221f6d9c8798cc957f864f52baf7b5c1a8609d7aecd67bd527d381c5c
SHA51208e2f0475f47699a4518828e52d478d5b593b26f8e50e228c8619b568e1906a09125cdda759ba7f8c45d1a30e5d69f23f0427531d0676de569a0013b1d3f2713
-
Filesize
1.2MB
MD5479f7525b7b3e85a15e56a1498d0e20d
SHA1b23fce8cb23b66d226ac6583bbe2a441e66cc9c5
SHA2566f5afd6221f6d9c8798cc957f864f52baf7b5c1a8609d7aecd67bd527d381c5c
SHA51208e2f0475f47699a4518828e52d478d5b593b26f8e50e228c8619b568e1906a09125cdda759ba7f8c45d1a30e5d69f23f0427531d0676de569a0013b1d3f2713
-
Filesize
1.2MB
MD5479f7525b7b3e85a15e56a1498d0e20d
SHA1b23fce8cb23b66d226ac6583bbe2a441e66cc9c5
SHA2566f5afd6221f6d9c8798cc957f864f52baf7b5c1a8609d7aecd67bd527d381c5c
SHA51208e2f0475f47699a4518828e52d478d5b593b26f8e50e228c8619b568e1906a09125cdda759ba7f8c45d1a30e5d69f23f0427531d0676de569a0013b1d3f2713
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3