Analysis

  • max time kernel
    1s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-12-2023 22:44

General

  • Target

    7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.exe

  • Size

    6.9MB

  • MD5

    7687a6093470ec3dbd3f8b5b2f6b6c85

  • SHA1

    760134ad1014abd55e13982c31a27aff1dee0a84

  • SHA256

    7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3

  • SHA512

    7a86c6c94beca2431edcb4d0c717dd8287407d62ab0bdab828c2ea2aea4e8506ec5cf320c425482ede7f27effac0a3e54893aaa1259ed227db423c7459d1c400

  • SSDEEP

    196608:OxnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:mNztzQlcDPXus98d9Jzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.exe
    "C:\Users\Admin\AppData\Local\Temp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Users\Admin\AppData\Local\Temp\is-5M62S.tmp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5M62S.tmp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.tmp" /SL5="$5021E,7025884,54272,C:\Users\Admin\AppData\Local\Temp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:1288
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1608
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:824
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3644
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:2616

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        21KB

        MD5

        c14434ea7b92e2d2a31b7301b5f2e5af

        SHA1

        6ab55170f81c46abcc3622eb6bbb4ece73f1e464

        SHA256

        d6ebc07256c98f9e98d2e37d07e5b46946b1c768f2f0b178d51ae99bc36c5a05

        SHA512

        afe30d56323972bf13145df56f79db718e4cc8d9fdfda32fef8ce845c9885717c8723226907a85f14604565252116ea833b8935a3a465889de231fe9cb822e82

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        79KB

        MD5

        bdbd39721674fb2b7d2d2b2fa5c37c63

        SHA1

        34284358805c2ee688ef7fca0d90da38ac6f0f4d

        SHA256

        5d1c7d506db5b002b53c12f2943bc46dcec4ea028ca8fc3989671480f3c277da

        SHA512

        c73695bab4f934cdb959c2362f95ea228b2d1659e3d31d616c07c354ce6c797ee7b4d59e0731101906bc37199bb1892b5acb0be37f7423f6e52955fcd42b9583

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        35KB

        MD5

        e4ab356b396ce0317f7e63352acc459a

        SHA1

        bd6a3999403459eddd65a3d276be3318926de07d

        SHA256

        4a84dfc754d8332bba43378428fed56a743ae92187d8ce3a1de5ccb9139cee4e

        SHA512

        d03adba5fce6b5d639fa44222853775c7d05bdfada8044038b5becbb28c1834e698fb9ab97e00a783d15b7a743769efa5e2f6f2e219f8f7cb17f2b52df847d39

      • C:\Users\Admin\AppData\Local\Temp\is-5M62S.tmp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.tmp

        Filesize

        1KB

        MD5

        14d083317674748d4cb8e3384484c890

        SHA1

        6b8c9037700f569ae228d1c8998b1d9faea21a48

        SHA256

        199e49960b2cc64da68cc9822271d7a667112c42703f976d38258f8c83a78a67

        SHA512

        f3d093902aa2d158e726ac6dfd689036352fdef5c6345941cc747fc175701ccc4e0215567e9620abfd17fa3f84cab07e1654957ce56c2fce4a6b898faf253de2

      • C:\Users\Admin\AppData\Local\Temp\is-5M62S.tmp\7efd87cb9facce4e82b5b1d037e1e2668d584e43b8166afdf7fe0bceabab14c3.tmp

        Filesize

        41KB

        MD5

        98bf35b4e3d23321fe91b20542c63021

        SHA1

        68edf33845ab0b1ad27eb504e670085bf3f27554

        SHA256

        d1f345040e05b5062a08bacb97899382f7f516d7cfd7d0066e3e19fad10e2a0e

        SHA512

        42be4bc96251f3fb5b31fcc9d1d95df24ec373cbb39555f38b0f1875cc381025fa677d433cad3e76ec60c773e1cabadc0fcb7d12dd0bfe2d2827bb1e256c9829

      • \Users\Admin\AppData\Local\Temp\is-K0I6F.tmp\_isetup\_iscrypt.dll

        Filesize

        1KB

        MD5

        30f56d3dcdbb4cee25cac7637364c580

        SHA1

        99fb8bc836254b3d273fde24225fdecbfbf58253

        SHA256

        24925300046609e14788b5a383ecbf2b11eeb555bc8b2f99ed0729cf904e0128

        SHA512

        183246d537305beb844dc9e9b62f400f7a565b38f014cf31962c373be5fff892b48dfeb59a552a15b94dee7d687c2bedcc3e283194a9e4244183e7bca1a1f121

      • \Users\Admin\AppData\Local\Temp\is-K0I6F.tmp\_isetup\_isdecmp.dll

        Filesize

        1KB

        MD5

        db6184777f072d8f3d28804aa99da162

        SHA1

        b62f98de6ac12318bb03da9a5329dc7930a474b4

        SHA256

        04d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf

        SHA512

        f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7

      • memory/824-154-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/824-151-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/824-155-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/824-152-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-161-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-192-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-207-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-204-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-201-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-198-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-195-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-158-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-165-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-166-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-169-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-172-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-175-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-176-0x0000000000970000-0x0000000000A12000-memory.dmp

        Filesize

        648KB

      • memory/1288-182-0x0000000000970000-0x0000000000A12000-memory.dmp

        Filesize

        648KB

      • memory/1288-181-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-185-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-188-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1288-189-0x0000000000970000-0x0000000000A12000-memory.dmp

        Filesize

        648KB

      • memory/4100-159-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4100-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4100-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/5024-162-0x00000000020B0000-0x00000000020B1000-memory.dmp

        Filesize

        4KB

      • memory/5024-10-0x00000000020B0000-0x00000000020B1000-memory.dmp

        Filesize

        4KB

      • memory/5024-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB