Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-12-2023 22:44

General

  • Target

    f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.exe

  • Size

    6.9MB

  • MD5

    9598b18293aa5ea8c0b67f7b1e71d41e

  • SHA1

    2b744c57fd66be1f7c6a33f7a813d8a0341b143d

  • SHA256

    f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926

  • SHA512

    b78de9ca726552b8f871b6d3d1ec10e005d387c5dc7c87eaf0d37acf0bd963ca7608df583495152d12b15551be104771fdd16ce1657bae6fb6bae9704951cbb7

  • SSDEEP

    98304:x+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:Mz25G6bV1yYDuZxCWQNhUU2uNzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\AppData\Local\Temp\is-BT9JH.tmp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BT9JH.tmp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.tmp" /SL5="$501EA,6985375,54272,C:\Users\Admin\AppData\Local\Temp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1400
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3436
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:1432
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 10
            4⤵
              PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        198KB

        MD5

        c5c9b7513782694749f212aad7177b7a

        SHA1

        315f3afec36ef5624c8a8edb3b277ec6fd24730c

        SHA256

        e9e5af753b967089bfab94dd32e5dd956cf6e5cb6443ccc6c5bce6c282258003

        SHA512

        83f0ab93be043a38345da325d214304a6b596fb604782e3b043fe9335415d7342185ff9571f878a07c1d4b4e88b846c0ad6aa05f161cab2e716c97c4c2ebca5a

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        239KB

        MD5

        12cf8613508b1f45129c3f89f41ea05a

        SHA1

        a543b43138025638db3915fad4a36df9853e75da

        SHA256

        b1662e08ecc554b91a58fcedc3a259cc71aad52b1bc72b0de274cc6ed578d2d1

        SHA512

        55abea76e6a15e7185a48a5e2e595299f75e818bfc3094f71a33f7056708ecbdf6aad62d227c17e16ea725d6ffdb3f6cf42a933a2f7e1d0067b19f7d5486d22d

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        187KB

        MD5

        959946b11eb3b4ae0a2d2ac1b9aed526

        SHA1

        446870f161e2897ce619ae62fca2e8bc5069ddc0

        SHA256

        9e5d98071139e4774d421a413bafe8598f655f470ca858233d2fff6dfd834e6c

        SHA512

        249bc7c4dda49a598078b77952d6a1ae3ca34aec46e829a0738e5a80d711b094f634a757e7cb8adf0bfd64a108e3db0d1c3345085afb5a2d42d0d92b130346d9

      • C:\Users\Admin\AppData\Local\Temp\is-BT9JH.tmp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.tmp

        Filesize

        26KB

        MD5

        7e50cd4da4ba49ad0f6a4eac5e720c84

        SHA1

        c7ad075c25840838c223ca797c229a46b6ac4d45

        SHA256

        70a584e648fdd9f244c83cdc491e8e4f91131d5836f8dd89e91b7b18f6080afd

        SHA512

        8ddd3d39333f2205f64edbb15eec4a3c6b118d10bdabf27426d5f29d2679e81081c362c8c867b17d0c64cd1a56794c14e676fc22a76a71c46392f43a161164d3

      • C:\Users\Admin\AppData\Local\Temp\is-BT9JH.tmp\f4f8fbfeca341e9bebfc3e2612b4b322d593c38ec7a00b7d91d733d7719a6926.tmp

        Filesize

        33KB

        MD5

        c16fcadff62f6c79c451dec9aa13d834

        SHA1

        c9a941488678adb019f29f50a31934d7ba6ada75

        SHA256

        1de5bee13aa9885a27a3801442c0c4ec639f6dee9909765df95ee72cf6e9f060

        SHA512

        7461ee432219d8fb2e5b78ca8a9d02e9f27f7e4f69948f23037d3ef5c4be49426ab70daf264dabfd7f8c4ff7abc9fb889dd7428ac70256fd92c4aee17240cc33

      • \Users\Admin\AppData\Local\Temp\is-Q7LN4.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-Q7LN4.tmp\_isetup\_isdecmp.dll

        Filesize

        8KB

        MD5

        a82265cb2d2343d08288678470d90767

        SHA1

        c669bb335de6a09cbcc75a33e7cfdafaf3213adc

        SHA256

        da2b1c3b3f3dd6112d66025863e69cd80079cae18c054654f49ae1a512df2647

        SHA512

        5b4b6950ff02ec331dc255de6e31eda04f122202a15875d2b7245758d0bddbdf6d81c1fb7e8a0a212ce0acb9d7969a52cdd54373673cc2ea6cca1e1b9b5c5b94

      • \Users\Admin\AppData\Local\Temp\is-Q7LN4.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/1432-161-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-189-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-156-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-209-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-206-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-203-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-158-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-199-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-196-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-193-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-190-0x0000000000820000-0x00000000008C1000-memory.dmp

        Filesize

        644KB

      • memory/1432-186-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-183-0x0000000000820000-0x00000000008C1000-memory.dmp

        Filesize

        644KB

      • memory/1432-166-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-167-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-170-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-173-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-176-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1432-177-0x0000000000820000-0x00000000008C1000-memory.dmp

        Filesize

        644KB

      • memory/1432-182-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2748-162-0x0000000000500000-0x0000000000501000-memory.dmp

        Filesize

        4KB

      • memory/2748-7-0x0000000000500000-0x0000000000501000-memory.dmp

        Filesize

        4KB

      • memory/2748-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3436-163-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3436-151-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3436-152-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3436-154-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3940-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3940-159-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3940-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB