Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2023 18:40

General

  • Target

    tuc4.exe

  • Size

    6.9MB

  • MD5

    e5f9baf2d41dfedc6d946afef0bf4f2a

  • SHA1

    6c7790c9e79645be54a103918d62390589fab135

  • SHA256

    a16840fd50d21d9d6849db446ec7702e96f4f854c1efbf77d6b5698662e98750

  • SHA512

    e6cae330c88ad2b1695b7df3b140d823d2cda40e889c5f18a7ccd66d09a92353f088421476acfd37bb52134095557066d686d67a38d087bd5a41ec9ebac7c376

  • SSDEEP

    98304:KQ+Vxb2IGx8i09D7OWCLPMTeQm5MT1k/lmrpt9l4Rx2UXwDieSC0kWppgK6TrzuG:UVx6OdDqWwWeQm5+kYrMCUX6m7y5Trzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tuc4.exe
    "C:\Users\Admin\AppData\Local\Temp\tuc4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\is-Q46PU.tmp\tuc4.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-Q46PU.tmp\tuc4.tmp" /SL5="$40016,6990755,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1664
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1612
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:2028
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1264
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:2012

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        85KB

        MD5

        2bca61e8c08dfa508b85c847138df22d

        SHA1

        036fa7c178287f355862370ad1b108f65d26a734

        SHA256

        dd3c96d959eb0795de6e4129828d8500e21a659057522cde3201724a4d94dcd9

        SHA512

        c01931e7caec79addde5803f697a887a0ab20474ce94c2c9d2900190754f75881686255a66ed22378750b9a4efa2631787dd78c4e100771291a826fb8b09aa07

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        84KB

        MD5

        e6f817ca6c7337571422945487a6d365

        SHA1

        4e57240e4df574eb51ffa67d5de51f1a071619fd

        SHA256

        edcd8f7c4a89c6c9458756382e7afbfc995c6dfebe826ddf6580bbb6eeee4880

        SHA512

        e30282c7a9ff08ad988f5ed95472801c06e31f1b9f6021c3d099939d014e567fd4ea2704af2994d5aba5931f2eca612c3a5b462e143debf78192947d3b21eb69

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        35KB

        MD5

        ad5e27d6b1b76f266d05a9d78da71f9f

        SHA1

        0880eed9a73046ec566ebbeeefa3c05deef11fb7

        SHA256

        b3e4b2ee1500469b0474d3a31657371bf846eccc88451e05880558793474eb9e

        SHA512

        da358c1c2a5433f68b2a4867500736f20b3b4b9ee579f5b0d7daaeeab9632846f585c3f62dda67ffefddffde916682ba2ee01cd170ce1908ff32142d2bc1823d

      • C:\Users\Admin\AppData\Local\Temp\is-Q46PU.tmp\tuc4.tmp

        Filesize

        252KB

        MD5

        15ac78c54e0a2bc4c100b94668c8f68c

        SHA1

        c1cb467567b9a525712aad5e3c9f1ae685c4e2ee

        SHA256

        301cde4d334b7b46a465808a09c6e18f33a9127fa2bd4e7313571f628a67345d

        SHA512

        61f1969ed2171b6ea6e10b9ac23155b20ce2ab5e706652e695d73da002885085e1788bae2b6536090ecb7b8a1f5c1db0e77df72bfafaec069ca6cd6378f8f0d7

      • C:\Users\Admin\AppData\Local\Temp\is-Q46PU.tmp\tuc4.tmp

        Filesize

        192KB

        MD5

        4f040ddc60d8520b592c963959d7b680

        SHA1

        f428f577ebd861202be107f8aa94c4b7bc656634

        SHA256

        5f64de6a30fa5f6b707f9a17d934268dc8ccb15a4b82d2ab2eb367ccec26e54b

        SHA512

        624813abe82eee976622d9655cdfa31673f3f83eb270f5084dff111c307484816c8a6058a358502e0c4a340d89bb06949dca85f377841c4241f078babe42a79d

      • \Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        70KB

        MD5

        77d73fb37b0ef4df5f458a25dda75bdd

        SHA1

        86195e66a584c4abb2e34f6433397b629da6104e

        SHA256

        c38640d0706a174dd1f132bd6dff39888d5ff14645b1d98b4a6261afffacabd5

        SHA512

        fc47dd6eb10b8d8f05f140a79ea4a8dfd63e7ba1db67f1d64e6cc95f8bb85bee77e81f07f4791e64dbae9da7b76394807c1c174f9a454eb6309cc60f3ef939e7

      • \Users\Admin\AppData\Local\Temp\is-9AETO.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-9AETO.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • \Users\Admin\AppData\Local\Temp\is-9AETO.tmp\_isetup\_shfoldr.dll

        Filesize

        22KB

        MD5

        92dc6ef532fbb4a5c3201469a5b5eb63

        SHA1

        3e89ff837147c16b4e41c30d6c796374e0b8e62c

        SHA256

        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

        SHA512

        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

      • \Users\Admin\AppData\Local\Temp\is-Q46PU.tmp\tuc4.tmp

        Filesize

        266KB

        MD5

        568325a90408cb3d80469a76c4e55a31

        SHA1

        d6799d49cbb41be44643abce1f90b8e93c0b6e2a

        SHA256

        8500f725547532d647591d9125a0a474e2c3dd5fc5fb7112e0a8388065602142

        SHA512

        9d8b8a1f5eca08d7a87cb22e0d2a08ac86e3ee41e893d4107b586587b954214d2e2566d624bc19b97bbe8155ee72b9b3074f590511dc0cb351ded4cbc581004e

      • memory/1664-154-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1664-153-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1664-157-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1664-158-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/1868-164-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1868-1-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2028-160-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2028-162-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2028-165-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3008-152-0x00000000037E0000-0x00000000039FB000-memory.dmp

        Filesize

        2.1MB

      • memory/3008-15-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/3008-163-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB