Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
tuc5.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
tuc5.exe
Resource
win10v2004-20231130-en
General
-
Target
tuc5.exe
-
Size
6.9MB
-
MD5
140eeca16a7851f9399d608590d77093
-
SHA1
3790852ee0bdfbf51e1a1b28d6592b5abc1b0a9a
-
SHA256
b8c73276b077a35fbaad746505fc4385c47e6fd1522867e8242e1308ed49e9e2
-
SHA512
852001c6c590a8353ab54489f9f6c3d1d7442da6644e9498be854358fd43d7bb00d04a2706559d55b30ffa0a6c93874feecd41d071da0ef1cff59c9de0b26fc1
-
SSDEEP
196608:txnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:TNztzQlcDPXus98d9Jzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3200 tuc5.tmp 4648 crtgame.exe 556 crtgame.exe -
Loads dropped DLL 3 IoCs
pid Process 3200 tuc5.tmp 3200 tuc5.tmp 3200 tuc5.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\CRTGame\bin\x86\is-1JST3.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-ADJ5P.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9SVGI.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-3GU7S.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-CPMAR.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\is-JAB25.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-SEFD4.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-J2A11.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8IKKL.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-M0KPF.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-B3CC5.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0K6NS.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-3M6JC.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5TT1O.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9Q6C2.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9D8EL.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-MBLTK.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-A58FB.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\uninstall\is-1AFOL.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-A53QR.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9LLCV.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-T3RRV.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-SE8C0.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-962FM.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-SAV4O.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-D11LS.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-T06HE.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-PFCSA.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-IADK0.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VRF27.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-CGLV3.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0GHV4.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7FJGB.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QD6H7.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-RK8H9.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-NECIV.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-ON0DC.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-AMFQA.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-T9NAD.tmp tuc5.tmp File opened for modification C:\Program Files (x86)\CRTGame\crtgame.exe tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-SVCQ9.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-ES025.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-JRA3V.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-1CHOL.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-PCPUK.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-U41C3.tmp tuc5.tmp File opened for modification C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc5.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-IH5O0.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8CG2L.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-H6FUG.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-79URO.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\lessmsi\is-NC4G0.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-8GOA9.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QMB69.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-866NQ.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7AUQI.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-5UVKH.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7CLC8.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-P8MMF.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-TB37M.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8PL5M.tmp tuc5.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-UUBBB.tmp tuc5.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3200 tuc5.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3200 4328 tuc5.exe 18 PID 4328 wrote to memory of 3200 4328 tuc5.exe 18 PID 4328 wrote to memory of 3200 4328 tuc5.exe 18 PID 3200 wrote to memory of 3820 3200 tuc5.tmp 42 PID 3200 wrote to memory of 3820 3200 tuc5.tmp 42 PID 3200 wrote to memory of 3820 3200 tuc5.tmp 42 PID 3200 wrote to memory of 4648 3200 tuc5.tmp 38 PID 3200 wrote to memory of 4648 3200 tuc5.tmp 38 PID 3200 wrote to memory of 4648 3200 tuc5.tmp 38 PID 3200 wrote to memory of 400 3200 tuc5.tmp 37 PID 3200 wrote to memory of 400 3200 tuc5.tmp 37 PID 3200 wrote to memory of 400 3200 tuc5.tmp 37 PID 3200 wrote to memory of 556 3200 tuc5.tmp 36 PID 3200 wrote to memory of 556 3200 tuc5.tmp 36 PID 3200 wrote to memory of 556 3200 tuc5.tmp 36 PID 400 wrote to memory of 2688 400 net.exe 35 PID 400 wrote to memory of 2688 400 net.exe 35 PID 400 wrote to memory of 2688 400 net.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuc5.exe"C:\Users\Admin\AppData\Local\Temp\tuc5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\is-2MFQR.tmp\tuc5.tmp"C:\Users\Admin\AppData\Local\Temp\is-2MFQR.tmp\tuc5.tmp" /SL5="$B017C,7025884,54272,C:\Users\Admin\AppData\Local\Temp\tuc5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -s3⤵
- Executes dropped EXE
PID:556
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 103⤵
- Suspicious use of WriteProcessMemory
PID:400
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -i3⤵
- Executes dropped EXE
PID:4648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3820
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 101⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD59445ca787fa9299e52b2afeccc31952f
SHA1e9db7c4659b98b4cf069c8bf0ea9890bd16a6707
SHA2567ff6dc9711076117a9fcb38e41ba94ebbe806a6b4f83482a13e9f7101369f8a4
SHA512974b44b70485ab8685d062f9209d0c1d324e6398effad524b94dd416581a5f47751e876b2fe65127713e4c9af517ba74967bea92da6bb7ea29fe2220f34091f4
-
Filesize
97KB
MD517f24c334254baf38f591683d69b11a7
SHA129526d10194143a508352ac7d9523efca0ec3051
SHA256059a4d465ff5cf84bbdfd266d9fab3a48a41fbf2c9a72a3d63525f73a7f1fdf7
SHA5121b7fd2618185651976abeb933372eac7d2698104bf01737eb5f93557fa0c25df52f2b310222d98482ecc586e14ab61cdfc9f915345cc1aa2edfe8940112c73b0
-
Filesize
149KB
MD5c1532bc974281bef4e5c4c7ed112e8a8
SHA1eeb6f26470fd01757998fc12788c151b224f0a36
SHA25620a0a39abb1fa7fdd418405543891529c2715adb9c086dfb95fcc14e042dee0b
SHA5128bf85716afa78d37212d35d4c1c1055326fc2dfaa963c23fedc739144978fee8f0f23f5594da19ce83ea65b27cfb27a57d43272c013b964097eab2b648901f13
-
Filesize
31KB
MD5943356f46ebe2a3aad3ea1a0b0d78fd3
SHA140a145fec537dcf93b48a41b004ee66516006640
SHA256f345d11e5d6d364e0d6a74fe3e28d7f3b1a2a772349ece75ea6e92c049d4d700
SHA512d910bc269ec2739ac72d235308a06ed41517beaaceeb29895f2309a5bab3d64478ce0d88769c88b9466c3f01760e088ba1b2e77e8bc9198363918ba1af3dfc18
-
Filesize
48KB
MD538de9227a251c6f0f39f8adeed187c18
SHA1b62589f99688d269533db069131e7f031be207a1
SHA256a83fb6dd19610a0126794e78d791603a9df0fb3ea2cfd161a69b69a9cc73d843
SHA512a765fe39b3fd52629f8509bd131b96a131f3192b27e7adabb7a256b99d64740aaa49499b431721fb7f8eaa46fb556a350ccfacf0f733a004fa6d700570340d9d
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
1KB
MD5db6184777f072d8f3d28804aa99da162
SHA1b62f98de6ac12318bb03da9a5329dc7930a474b4
SHA25604d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf
SHA512f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7