Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/12/2023, 19:21

General

  • Target

    e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.exe

  • Size

    6.9MB

  • MD5

    d67fa911a5dad3b1ef45212b7a5a6a86

  • SHA1

    2c0509321ef0892efd057a7ee6057d13a7a73a84

  • SHA256

    e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e

  • SHA512

    093e2add17f1cccd889783bd0f66ca856e941d8821a6df9db64bfe414a87aa1851ed87ec5900db6b8f4e87f0cfcad6eacb8a9353515810434afac2431681b4d6

  • SSDEEP

    196608:BK2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:BDY6tiP3myRfzepXe4ny8gxzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.exe
    "C:\Users\Admin\AppData\Local\Temp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\is-MRE0M.tmp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MRE0M.tmp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.tmp" /SL5="$401C4,6991381,54272,C:\Users\Admin\AppData\Local\Temp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1968
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:1592
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3400
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1512
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:2516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        436KB

        MD5

        ce1b14c2ace53164cf124b95290f5c3e

        SHA1

        8ed796f79b3dbea2901f665a31aed0c98dbc35c0

        SHA256

        b7dcbcbd52dea7648703e4c13aac351469f6176dba9199c5acf4aa91c15acf83

        SHA512

        60499491bcbe473581145f871db9d88e1214dad9daf38b02276e1b343042ecfc116f8063900084ba96a7086e45f5b12e8af7d569b335ba26197b5b95889b3a6b

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        709KB

        MD5

        60a0c5800368717684504da38cf07f5a

        SHA1

        0c2022016bab246a2845ef3381377361207797ba

        SHA256

        86bf69177ef76c9eaba5bee686d698d1c1643fae5c62891c8b22f8324c76e6e7

        SHA512

        4317c17dff8f6d7b55fd39d452dfaf30b601f95f486af3e38e6855b10cc6bdba71651245f496dc11d29620df7b0616c16316ba37b1c32a903f08071d36c6dd58

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        140KB

        MD5

        fc5628941ef6e7193381480f015e9c3e

        SHA1

        ac4ff1fc7c9309c27e52e0e497c83f24926d9d88

        SHA256

        e03bef01c0da80d70c6cbb22d39b13358839e2372f3fc73c93c80375d1d0fcf6

        SHA512

        6c26cbff10cb9c76235417340d8c903276bee05ece4be85a0dd1251cbe79139ddd5e3e067d766d4c224dd3ee2a12250d28d698cc7bd9f1415fb763e0db8bd899

      • C:\Users\Admin\AppData\Local\Temp\is-JKEFT.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-JKEFT.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-MRE0M.tmp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.tmp

        Filesize

        673KB

        MD5

        4a222c3c14fc03b368050c6c06a8f154

        SHA1

        7de6926668b5d6bb5e008e0a192f16a661d3b253

        SHA256

        d2b65241f69a48ca1b7c1d30578aa18547a050b608ea0d73f6e36b6b5a5c5f43

        SHA512

        a4ea7561912ff72c05eeba8c4a83ded53856152200d51fa5b3b117203c94e96aee3604c94ddf6b77ccf02b2cc52cf8da3cf3978bcb37f5b3197c37a999d98630

      • C:\Users\Admin\AppData\Local\Temp\is-MRE0M.tmp\e6ab2b6567d0b974f7e70678dbd77a3ca02b8c1107748ac774b03e5eb846b79e.tmp

        Filesize

        447KB

        MD5

        692d15e47e819718360f6944d3891cb5

        SHA1

        487b738ca7e3329aba19e40108e4b7b9255e0cf8

        SHA256

        d4b6e4594613debd51b5509fa6ccb1415ca989296e8f48bead0b3126e36b4be7

        SHA512

        26406d33c93beb750d0e5eab4e853c0b7254560bfd1ac075c748517a558414cf0a46d191f9a15d1305e4a15ed6989bbbf7ea9a094ca9a60791b3fbf080cbfb2a

      • memory/1592-151-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/1592-152-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/1592-155-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/1592-154-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3172-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3172-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3172-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3400-162-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-179-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-157-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-208-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-204-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-201-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-166-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-167-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-170-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-173-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-176-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-159-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-180-0x0000000000980000-0x0000000000A22000-memory.dmp

        Filesize

        648KB

      • memory/3400-185-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-188-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-189-0x0000000000980000-0x0000000000A22000-memory.dmp

        Filesize

        648KB

      • memory/3400-192-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-195-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3400-198-0x0000000000400000-0x000000000061C000-memory.dmp

        Filesize

        2.1MB

      • memory/3424-163-0x00000000021F0000-0x00000000021F1000-memory.dmp

        Filesize

        4KB

      • memory/3424-7-0x00000000021F0000-0x00000000021F1000-memory.dmp

        Filesize

        4KB

      • memory/3424-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB