Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/12/2023, 16:56

General

  • Target

    cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.exe

  • Size

    6.9MB

  • MD5

    c775f670b3e8d172bdc9d159f744f23e

  • SHA1

    2cfb5bc5eacd3d6e1f832b1dd8de83fbd1ff2f7b

  • SHA256

    cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61

  • SHA512

    5cc2de61e3c9fa542e85f1870d8180627a9620f3b73eddf1db4cb7f5ea35f6989b797928caee5b6ca928c53a7a1710f87447ac877168d113664aea5916a0be3a

  • SSDEEP

    196608:rxnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:BNztzQlcDPXus98d9Jzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.exe
    "C:\Users\Admin\AppData\Local\Temp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\is-JNTIP.tmp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JNTIP.tmp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.tmp" /SL5="$5020E,7025884,54272,C:\Users\Admin\AppData\Local\Temp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4364
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2828
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3400
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3444
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 10
            4⤵
              PID:312

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        732KB

        MD5

        75fb1fed70d20bc6078edbe9ae9f07fd

        SHA1

        761012a1679f5485af72ea39f87a9d2514736403

        SHA256

        ac0e148e8f889a83774e0ed5e2b52abaf155595dce682b447910c5a27147d91c

        SHA512

        fecde681264a01db08aba8434b05b2fa9d90a5526e830f6ef90ed6e0958da9b68ccf3d182c292c99f6f2e6acae7e553dddaaa3716bf44b7a93d8a9e63b360850

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        1011KB

        MD5

        ee11db7c2207c4ca627eff46e15eca03

        SHA1

        0a2068eeb35ae617969989afdb8859e907f4b511

        SHA256

        fd062431e2b464f9a190e8afd5989a31aa2bfe4753b43f7377db5f172e1ed75a

        SHA512

        450ce650ebe7bb14c400a538f59200d5b0f7a0e2401958c102f61dc28e4868b07bf042ace0bf56b8079cd81efa29a23ebadf644b6090dfc415fe4fb5dc043555

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        446KB

        MD5

        dc15845f5d2c37a7907e3d750bf5bd06

        SHA1

        7266ad1d76ba4c348b4a4cb0bf11f1dbf18a2dff

        SHA256

        03fdf509ce2dd6012f2f2247ab001f6d8c40dc37165972e79a070c80bc1791a0

        SHA512

        795857e3afc9547ca210f1f2b4117e49278329ebb60919098b0e002e4edbcde9f236aa814525a4eefae6b848f97dda2808a67745f4c1dd93b77e8e3c767a8967

      • C:\Users\Admin\AppData\Local\Temp\is-JNTIP.tmp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.tmp

        Filesize

        502KB

        MD5

        df6c4269c7331839375e5717a6a4d326

        SHA1

        063a8a066c334320757c6eecdb8510508a3f251a

        SHA256

        7efbb16b222573846e6627446dc4097458db5c7cedb50a27035c5ef193b2266c

        SHA512

        7b7216e97de3d412d20298620e64d2d1d917787b4733e88a86b16283ac76a337da36a40642a3a49e89d08def311a510f96fbf5a284ffe797c124e022476edab6

      • C:\Users\Admin\AppData\Local\Temp\is-JNTIP.tmp\cc8a9ef9a2a1097eb409c4ad34315007d0c4bd17fbff79729e03d4980a25fe61.tmp

        Filesize

        244KB

        MD5

        fb931bac5cdf7edcc5201788a548fb10

        SHA1

        d663ee5094626cbf7251237bdcaad9b26432bfa7

        SHA256

        d454140622dc71c48420217b098e4754fa6f4f3acb7b7ad4a156ef4c4d97a48b

        SHA512

        b72a083a5ecfc405f2834d6c74454b7b970736be2d73be76eecd88539092c8398342674d62994d7374f43e82c37021d8517b83d41092d02a114752bbc951199c

      • \Users\Admin\AppData\Local\Temp\is-229MC.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-229MC.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/2064-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2064-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2064-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3400-183-0x0000000000990000-0x0000000000A32000-memory.dmp

        Filesize

        648KB

      • memory/3400-189-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-209-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-206-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-157-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-159-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-203-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-199-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-162-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-196-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-166-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-167-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-170-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-173-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-176-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-177-0x0000000000990000-0x0000000000A32000-memory.dmp

        Filesize

        648KB

      • memory/3400-182-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-193-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-186-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-190-0x0000000000990000-0x0000000000A32000-memory.dmp

        Filesize

        648KB

      • memory/4364-154-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4364-151-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4364-152-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4364-155-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4816-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4816-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4816-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB