Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
10/12/2023, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
tuc7.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
tuc7.exe
Resource
win10v2004-20231127-en
General
-
Target
tuc7.exe
-
Size
6.9MB
-
MD5
c6929fd4bbf5c4ebf91a0d26a50aea7a
-
SHA1
342d8880e590afe4d4818c0c341f035ac6b01c4b
-
SHA256
2b2bd5a6642340b1511e2c37d4eba8e2bdcbe72db692a2e5c58f09eb40b158f4
-
SHA512
f56a251487aec385eaf7f0c8fbc50f26c7714b45c6afef46bf4d7f06157ec8ecde8208cdea46f3480706eede053fbf7dc9bf19520b0cdbd9efe3ced53b3d55a9
-
SSDEEP
196608:2A89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:GBmakyVnlUQ7Wz3Tv1jNTh0zj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3004 tuc7.tmp 1992 crtgame.exe 2956 crtgame.exe -
Loads dropped DLL 6 IoCs
pid Process 2872 tuc7.exe 3004 tuc7.tmp 3004 tuc7.tmp 3004 tuc7.tmp 3004 tuc7.tmp 3004 tuc7.tmp -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.49.94.194 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\CRTGame\bin\x86\is-FAL2T.tmp tuc7.tmp File opened for modification C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc7.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-BPAHJ.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QJMPP.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-P9TJ2.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-JHOOP.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-KNMQO.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9SNS1.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-91TOF.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VFDMC.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\is-GIKTQ.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-S6A2D.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-I6FHT.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-OT7LG.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9N7C5.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\uninstall\is-ITM54.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-UUR3P.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VLJC7.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0VCAT.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-B1J76.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-KM6K9.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-PI2LV.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-G86A2.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0D8EV.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-EK7UJ.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-TRMAE.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DJJ5S.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-BQQ97.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-C9A8A.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-BAUMC.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-SQ3M3.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-L7RP8.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-KRF5D.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-C3NB5.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7SPSP.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-NRG8U.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DBFF9.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-3GPJL.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-PAIL1.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-MTFQ3.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-01PPF.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-GHK7J.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-3GU49.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-I4PUR.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-6RNMK.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-CGNFN.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\lessmsi\is-AMC6K.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-1VSD1.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-HF3O6.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QRBDA.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-UF1Q9.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-MU9IT.tmp tuc7.tmp File opened for modification C:\Program Files (x86)\CRTGame\crtgame.exe tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-F7U7E.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QMEQC.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-3OF0P.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5J3Q0.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-HJ46B.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-28BLC.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-99ETJ.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-J8PS3.tmp tuc7.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-TRD56.tmp tuc7.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 tuc7.tmp -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 2872 wrote to memory of 3004 2872 tuc7.exe 17 PID 3004 wrote to memory of 1984 3004 tuc7.tmp 29 PID 3004 wrote to memory of 1984 3004 tuc7.tmp 29 PID 3004 wrote to memory of 1984 3004 tuc7.tmp 29 PID 3004 wrote to memory of 1984 3004 tuc7.tmp 29 PID 3004 wrote to memory of 1992 3004 tuc7.tmp 30 PID 3004 wrote to memory of 1992 3004 tuc7.tmp 30 PID 3004 wrote to memory of 1992 3004 tuc7.tmp 30 PID 3004 wrote to memory of 1992 3004 tuc7.tmp 30 PID 3004 wrote to memory of 2848 3004 tuc7.tmp 35 PID 3004 wrote to memory of 2848 3004 tuc7.tmp 35 PID 3004 wrote to memory of 2848 3004 tuc7.tmp 35 PID 3004 wrote to memory of 2848 3004 tuc7.tmp 35 PID 3004 wrote to memory of 2956 3004 tuc7.tmp 34 PID 3004 wrote to memory of 2956 3004 tuc7.tmp 34 PID 3004 wrote to memory of 2956 3004 tuc7.tmp 34 PID 3004 wrote to memory of 2956 3004 tuc7.tmp 34 PID 2848 wrote to memory of 1736 2848 net.exe 32 PID 2848 wrote to memory of 1736 2848 net.exe 32 PID 2848 wrote to memory of 1736 2848 net.exe 32 PID 2848 wrote to memory of 1736 2848 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-NSSNC.tmp\tuc7.tmp"C:\Users\Admin\AppData\Local\Temp\is-NSSNC.tmp\tuc7.tmp" /SL5="$40026,6977575,54272,C:\Users\Admin\AppData\Local\Temp\tuc7.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query2⤵PID:1984
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -i2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -s2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 102⤵
- Suspicious use of WriteProcessMemory
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\tuc7.exe"C:\Users\Admin\AppData\Local\Temp\tuc7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 101⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5bc83d1fbe01ad49c45ebabccbaa0d1a8
SHA12f12c123b3da3160ff2ee63129f4822f0397ae16
SHA2566b7bd4885e7860c38ef1d3ded421287d975fd383d743ff4b4cbf022386fc68c5
SHA5124de6268efb9ff509d45b5915438df195533f832f6ee96efe13ce5195aea73d42a403ba2342cd93bf6b1d1c7c01fd283463d23c734db1891e81ad34a0e939766a
-
Filesize
225KB
MD5beeb6ec080378e21de77afda6eddac41
SHA15435ad754d3940b79ada0e6d294abfca8cc42fb7
SHA256243ef22909ee4bf35bdc592892086aeb5f0065e7910ba880fec93d111192909f
SHA512cf96005ec07bbbabc3162c28ac99a749b2cbdeb23f75cdd8c91af2dbc36775887a1a71bb56b2b6a1b60db58ce3a5d9597994c78f26a4bf53d074656f57773305
-
Filesize
208KB
MD5131fde7f56e0e0274c60fb9623b5b852
SHA12df163896f4047b37c32b4d13b307a2bdefe6f26
SHA25600b66fba34932e6745830a2f8e372d38e8047bdfa6f068364c7f34570e6d7844
SHA512c3cfa329dbc1e67bb93785e7d6ba92dd6545d12edb9c8b4884c088fd207e375f16bf12cfc4ef0d24842f3f4b23a04e910d651769a1ae6a581283f6e8b73141c8
-
Filesize
224KB
MD56317dd448df81dc2f4c2adfba8877788
SHA168a5fcce4faa4389cd41f11a909b66c620777376
SHA256b66aa0223ff5874218c5733ec11395c471ecd1ac48eef3d8ab47f5d3d6117d0e
SHA512adcf1b7e5441f34d6d5dc951be47208230992b8fe1aed94f17fc9bc4a32bfc4e4cabab716b971b96e5e8fc6a1c94a11d413d058085e7e49aeb8b5d16bd3e6427
-
Filesize
250KB
MD5dfaaa2efe17ce1e86167636d364ddc7d
SHA10f8a0e55aa82858f4e78c2bcb14e00ad0e3a05bf
SHA256d1b29e1e21c4dde63e3dd1d3a26e30c260399cda42c01dc9f7fe80994af41320
SHA512e80cf9272e3cfb607a3025965a5d2a46a0f9470f064f0b0205a12b228a81ecb7212fc1d8afda3273ecd0e093f024f42330245c7c291d59b0ff2a6752289fc196
-
Filesize
118KB
MD5c36d45547e07a910843df663f04be7c0
SHA18845f3f916136902c399c17947f897370140518a
SHA25624e7321b05ff481e1c83aa81522dab1fa6427eb362372f7571dc1fe0540da3f3
SHA512be18d9c68d77f4a1e59e23c6213b6626b50f6cb8d2eb649f6a284e8a3d4697974d967fc43b3f7e1d5fa9c7270716f7705b362ac86d89c32a599bfa68f6c12c68
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
334KB
MD50a526609bdfd250cab5f57a5948a99bc
SHA1b3f4f9a7dc0146e7be20c27f19dc0577eeff83d9
SHA256cdf83f6afe30a566473f60abc828a9f51ee6394f84096fcd3c09aa25426a56ad
SHA512f59b353937f226c291045d87e8de622b6332bc69fde7a90dc7ffdc189ca8903a7fc7665afd30c13bd80080088afe775f3d74db72a7de9d023a9c2052a3b11a11