Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2023 22:48

General

  • Target

    2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.exe

  • Size

    6.9MB

  • MD5

    5f10e2966082c63fea201117ae85169b

  • SHA1

    6c095c462ca5293f52f63da296c3988a628efe59

  • SHA256

    2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6

  • SHA512

    a5b80e334b28d35b927ab2aac9bd31a5c2b2f2b39f16218d8e54219c1eea669326128a4a2ca497a0ef24e041e7abcfb76832e864008f4c46ec6e2183e355a308

  • SSDEEP

    98304:n+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:+z25G6bV1yYDuZxCWQNhUU2uNzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.exe
    "C:\Users\Admin\AppData\Local\Temp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\is-H338S.tmp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-H338S.tmp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.tmp" /SL5="$C0064,6985375,54272,C:\Users\Admin\AppData\Local\Temp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4804
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4736
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:2140
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:668
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:2064

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        61KB

        MD5

        e5b765cf0501fadcf9c5763e89bc93a5

        SHA1

        9f6aedd072edc28ab7eee22e21fac3e254fd20a2

        SHA256

        fd0ce359fff6a91830734f90c0487ab08c6ff839a5fe1c5712d3894b562b9a7a

        SHA512

        baff089fddf2b38e7eadb2d745520cff13648e3317e05a13ad4c14061c6532206e81c67c39b8112599ef736480f9b94b08955da1d1faef57d508995d48dfcc0f

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        65KB

        MD5

        1dceb1405bbb8bef8ee6aaad6d26311d

        SHA1

        4861bca6f305dd48bbf77f2fe238bcae804c37a7

        SHA256

        9bc66121ee6d5bf9d566fd1612d6c32fdb4a694386da2711326dff8ae8157bcc

        SHA512

        a1ebc3ee2576863101008d8fbbe38f0a0c22ab54a2810a16b3095620833ca7b3c3ebf4314b2f8d3fb38e330dbf29308dfb704c63dc064286e72955cb17e532b5

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        45KB

        MD5

        f8c8d78ecfe7b224697c2ebbd8328f48

        SHA1

        23983c7c8cb642c11ba9b28de1076b7556fdbbb5

        SHA256

        f5703ccbc3049c493796f754f7a1b65769f32c5349c0126f0edd312443417c14

        SHA512

        1de7f67f2b6e83b292373b55b7c002205558dd12fd1f1621753a87f98cd88cda6f94dfbf23f267492866a15f84186c6cd2f513d597d66b38c6fd9ad64c7d85ab

      • C:\Users\Admin\AppData\Local\Temp\is-H338S.tmp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.tmp

        Filesize

        79KB

        MD5

        22540fe1d370dbb07162d98c574da026

        SHA1

        f64f401f00e67660f25607a10aec3a038913c9f0

        SHA256

        98dc51bc0f12fdd20dfabe3d1b8468aac31d4fda8904687a30b7cb1b18797ed2

        SHA512

        323db9d5f0578794f880e318df6a8214f946fe45042d4db94a1dd88ee3b8a080171d85290197f8d680ca6e47e952351b2f28801c43c0172446cfdd98fefa9d3d

      • C:\Users\Admin\AppData\Local\Temp\is-H338S.tmp\2b95df8fa528b9dd9065b7216c7d10426d56557992bffdcd70e915902003cfb6.tmp

        Filesize

        15KB

        MD5

        a69054dfed9fa1fb17542e4f84fad041

        SHA1

        134d4c36e9dac66d15649de346d830d5960e8c60

        SHA256

        b4247b1287e02675a9373988c04f3f8504a5fd1543fc367fdd4a651bc0447287

        SHA512

        8e274930ebc678a6e6844032907d81b6f347eb670ebbb9664a46d8f08fbfd48291c1401a4fe90a34487b072f4a51605e9be469ee0b56f3fb6cf803eb7953098f

      • C:\Users\Admin\AppData\Local\Temp\is-UHJC8.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-UHJC8.tmp\_isetup\_isdecmp.dll

        Filesize

        1KB

        MD5

        fd9648f0e3d3a6ea8e202bdad81e1874

        SHA1

        07aa70a3b0949a70a92a58f71f6fff6baf68d432

        SHA256

        aa6e590429a24b0f030608d4d08713de5ebcb8cca0052f76b5ec0038b456e81f

        SHA512

        689de576832abadfe15bd18bc43aeb2e3e63a751bb9c65223bf4a09cad4a65c7cf9c97ca7d8e6e827bf61bbf13ffeea3167a19bb993cfe72b78b95a2db43e1ae

      • C:\Users\Admin\AppData\Local\Temp\is-UHJC8.tmp\_isetup\_isdecmp.dll

        Filesize

        1KB

        MD5

        db6184777f072d8f3d28804aa99da162

        SHA1

        b62f98de6ac12318bb03da9a5329dc7930a474b4

        SHA256

        04d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf

        SHA512

        f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7

      • memory/900-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/900-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/900-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2140-152-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2140-151-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2140-155-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2140-154-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2456-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/2456-10-0x0000000000570000-0x0000000000571000-memory.dmp

        Filesize

        4KB

      • memory/2456-163-0x0000000000570000-0x0000000000571000-memory.dmp

        Filesize

        4KB

      • memory/4804-182-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-183-0x0000000000710000-0x00000000007B1000-memory.dmp

        Filesize

        644KB

      • memory/4804-158-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-166-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-167-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-170-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-173-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-176-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-159-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-162-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-178-0x0000000000710000-0x00000000007B1000-memory.dmp

        Filesize

        644KB

      • memory/4804-186-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-189-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-190-0x0000000000710000-0x00000000007B1000-memory.dmp

        Filesize

        644KB

      • memory/4804-193-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-196-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-199-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-203-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-206-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/4804-209-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB