Analysis

  • max time kernel
    121s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-12-2023 18:25

General

  • Target

    47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.exe

  • Size

    6.9MB

  • MD5

    e7a0cd0c8776e819c497560c692c8fc2

  • SHA1

    7927979f5c46cb48c7376b51bca3031eb0762633

  • SHA256

    47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d

  • SHA512

    d2d96a2b6cfb8b9e12b4c2915d5c5fe7d3450c221bffc1fba309d6bccd9e03d94c71e824f65f481c96fcb42c5831e10987d04738fc3cdd98e8b7c0e42e6ff392

  • SSDEEP

    196608:kK2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:kDY6tiP3myRfzepXe4ny8gxzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.exe
    "C:\Users\Admin\AppData\Local\Temp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\is-K94LH.tmp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-K94LH.tmp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.tmp" /SL5="$50236,6991381,54272,C:\Users\Admin\AppData\Local\Temp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4192
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4148
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1392
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4064
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:1200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        184KB

        MD5

        f45c581e100c6e03be0116da3fd40fa1

        SHA1

        29e43149ae0f163bee78c8d7f052b89fd3c1d136

        SHA256

        f40224bd7d11d6c1d3be73c8f3d05666095c60e5f40ae49e06e7b4248b5bfb0d

        SHA512

        7cb83d0f090ab0c04f3ee31a88d3ebeb2f354ea2c61711d138695d694ea03707750f19f679a4920589f4ea9721da9510b44a4a1709dcf0d1db3e6b90bd4a0d47

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        110KB

        MD5

        9354c048f7e6ac988b8bbc9ae87a467e

        SHA1

        32d96926b0ba4b52a1db9a6865105b0a9cf9972d

        SHA256

        9b82484a6349b0405bec628bc942308c8cf343650330bb52981ca6b4d7c5bdf3

        SHA512

        d518bf7ed3dccaa522a28bfd56fe7301c87687570ae10d42e3ef1d952d5a3abab3fad8706be6c8f606375b3dae803f0804572e99c59e3f0499fe72f3a4b68b49

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        92KB

        MD5

        88d9b6780e19dfb7825f94b06560451b

        SHA1

        ba6fc7cef164911b09cb7f49f8f4a6541550b25d

        SHA256

        24249b82935afecc06b5eae92d9e8b084df2b2e2b72f0da1447a59950cb3d7c7

        SHA512

        496c8767a6c1e85667daff18302b88c4daa3f67bfcd1037d78bec2c7885a7682c3b690326633d65c9e1124080c82377dc1e648e87b14820bdf5d27e89b7bd93d

      • C:\Users\Admin\AppData\Local\Temp\is-K94LH.tmp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.tmp

        Filesize

        104KB

        MD5

        507e325d44b4e6c59ed3e83f707dec10

        SHA1

        a0e7386bb125fcbfc6ca8a2261ecd739552bac35

        SHA256

        6092d2b9a2b9988ee72208438cad4b31ed661a23410e10a674426e93112853a6

        SHA512

        942890514439bf2e1bd1e4e25dc8a7c74fa2ac4398788dc23c98db8dce7542bcde62435b8a1f577fcf715bc843c9d2f86ade557a62e59d8e93af6b4bbb501703

      • C:\Users\Admin\AppData\Local\Temp\is-K94LH.tmp\47a0769cb5deb1336132fc3eacbda9b9fbcc68ed70ac79323cf94bd7797d4d9d.tmp

        Filesize

        124KB

        MD5

        dde4aea487c01cc25a89edc88f9bf460

        SHA1

        47af6fc3055764a8842373c32dcb819b9c0516ad

        SHA256

        0f4e77ca40f0f003318051fb758f366da2914a308791759ec145a5fdf63df5ae

        SHA512

        a28f8d1825773f256f43998b203923587ee4b2575e7e3eaaa988d8313f8303d6387648d2f3630747e20d248ae6254482907c7ea1365e51df0ee78d93e073923c

      • \Users\Admin\AppData\Local\Temp\is-2JGP4.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-2JGP4.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/908-12-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/908-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/908-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4148-158-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-175-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-208-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-205-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-202-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-198-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-195-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-161-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-192-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-166-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-165-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-169-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-172-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-189-0x0000000000950000-0x00000000009F2000-memory.dmp

        Filesize

        648KB

      • memory/4148-182-0x0000000000950000-0x00000000009F2000-memory.dmp

        Filesize

        648KB

      • memory/4148-181-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-176-0x0000000000950000-0x00000000009F2000-memory.dmp

        Filesize

        648KB

      • memory/4148-185-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4148-188-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4192-154-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4192-152-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4192-155-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4192-151-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/4520-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4520-159-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4520-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB