Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2023 21:05

General

  • Target

    fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.exe

  • Size

    6.9MB

  • MD5

    759828097cd14339fda4fc4e88d33064

  • SHA1

    6cda4009f19f9c6e2fe2225b79c45e4305cee65a

  • SHA256

    fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985

  • SHA512

    6bb78bd786b8ffe83784e9df62d7ff4770a619a0d15c9f6bbc83d940d2645fc32d1a47b02c76b4000601af92a1d40cf559fa4a94e06979f600b7b9c4f3ca6fd7

  • SSDEEP

    196608:3A89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:jBmakyVnlUQ7Wz3Tv1jNTh0zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.exe
    "C:\Users\Admin\AppData\Local\Temp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\is-IT1GM.tmp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IT1GM.tmp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.tmp" /SL5="$110046,6977575,54272,C:\Users\Admin\AppData\Local\Temp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4572
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3884
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4676
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 10
            4⤵
              PID:4632

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        1.7MB

        MD5

        dd730d8d3214660fafe7337a01fe3391

        SHA1

        80e46f14ea33c1c617f55e159455f8c02b8ea601

        SHA256

        2ffceabb9b6aa5be2a236875ecfa649df5f8e889d594877a473bf8c8f1ae9b3d

        SHA512

        eec5c5abf794084132cc4f96e7448508c6d4603dcf21827cfb4eeaee47f1ecfd7d2965f1a5a99a4c7edfed1f6c0630f3ccfd388f7cc925bbade4918a26131d1a

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        2.1MB

        MD5

        e9f17707ac869859181f512cd26ce1c9

        SHA1

        da685cce3a07dc0fe302fd2953ef5d682d58ea90

        SHA256

        825adb4cb11c9cfc85c742fee59361140229f5c1319d4430ad4f24d9c1e76ee8

        SHA512

        3863a982e71e4fdb9af798f2c9c92768d1812b0277a00858e48fa7cbced9ae75c9bfe9946bbdf6179343f76cd0cf109793475d7682889492ce0073731ddc7270

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        1.1MB

        MD5

        d50dce42548808a4026b0d4e55ddb7df

        SHA1

        474832c7e4cdc04d565fab57310b7455927c3071

        SHA256

        c8fa18622ef7f8fb49e2c6c67172a682365b4db0771e7f86346525c7802ccc9c

        SHA512

        065ed1ee891868607d60435bdbc547070f31fbf3005c1b3efe00fd77a273970f3d884e56791dba82bf7a06984e24061971d760a573fc493670dc2308f7548b61

      • C:\Users\Admin\AppData\Local\Temp\is-FM1VU.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-FM1VU.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-IT1GM.tmp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.tmp

        Filesize

        276KB

        MD5

        a0b506d59beeab729e231059ce407682

        SHA1

        5189b7930c58945ad7fa30420bc05757a8e2c550

        SHA256

        872b182401007a11f4389fd472ccb1247532e4cf45a65b911ee1765a7f12f38e

        SHA512

        444537451bc23c0e80cc165a35e8d8069ed8e3e29463fd03c4dcea47da0d0bb6a127ab30687fbc403092fbe51c151bf49e77f5039136a7d6d438cac9c5289e7a

      • C:\Users\Admin\AppData\Local\Temp\is-IT1GM.tmp\fb01776e04f006dd528ec65d1a6162c5af58d3ebde1bf9f6e5ee17e8137c9985.tmp

        Filesize

        391KB

        MD5

        d97b056c031a13690415a3174e9da4e6

        SHA1

        60e41dee420af0c79e688c9e97c7ffe38e545d4a

        SHA256

        ee0cd7e38561fa1ab2141d108225bdc1aea7e4f7d41cda86b399d508152c8217

        SHA512

        bc5881efc6cbd84e74d2cd2fa2bfac25f51e1a7692817205250587f04c87716f74475a40ef2c6d39a82ec897d9e2bfef09f91c92be31bc86a89ff225dc82d87d

      • memory/1992-163-0x0000000000670000-0x0000000000671000-memory.dmp

        Filesize

        4KB

      • memory/1992-10-0x0000000000670000-0x0000000000671000-memory.dmp

        Filesize

        4KB

      • memory/1992-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3884-152-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3884-151-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/3884-155-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4560-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4560-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4560-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4676-176-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-180-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-159-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-166-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-167-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-170-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-173-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-158-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-179-0x0000000000870000-0x0000000000912000-memory.dmp

        Filesize

        648KB

      • memory/4676-162-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-183-0x0000000000870000-0x0000000000912000-memory.dmp

        Filesize

        648KB

      • memory/4676-186-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-189-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-190-0x0000000000870000-0x0000000000912000-memory.dmp

        Filesize

        648KB

      • memory/4676-193-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-196-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-199-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-203-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-206-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4676-209-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB