Analysis

  • max time kernel
    143s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 00:12

General

  • Target

    5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.exe

  • Size

    6.9MB

  • MD5

    68cec8b954419d7cd1a73643f3ce1a7f

  • SHA1

    f84445151aa12b3027da9e0308af67b57cbb32dc

  • SHA256

    5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12

  • SHA512

    04707ca3ce56dcd822f3ac374976670da81e8c6d7fd0a7e63a4e60aa9f3f607ec2021971598a962332517004b88457bf9b4555a091c93ef31c3c65f7b410a36d

  • SSDEEP

    98304:0+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:Nz25G6bV1yYDuZxCWQNhUU2uNzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Users\Admin\AppData\Local\Temp\is-G5E10.tmp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G5E10.tmp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.tmp" /SL5="$4023C,6985375,54272,C:\Users\Admin\AppData\Local\Temp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4800
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3536
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4256
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 10
            4⤵
              PID:800

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              1.0MB

              MD5

              5d7bdc06aa7c55a5bfdda7136c4a61db

              SHA1

              e295f57326cfcfeb87c4fbc1b2875f9d7d7c086f

              SHA256

              5d045fe5c5053062496b509d3d14230f375957188b33a1b6286aec8ba7d84d4b

              SHA512

              bbbaeec9e53ac73798d919a2107e4993a1da74067cb9707d7f3cb0ebe53d33303a8bf76f1910985c8e999e3a24ba5b586131651c463bc3da0fa5adb02094b342

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              792KB

              MD5

              87bb292b406c4d7b424f5f5ac399282b

              SHA1

              4784441120716e301271acaafb15eed022d5bf7d

              SHA256

              6cf79d3c14ca317974f61391134214d44fae0d2bd0be796628fd9e6d48e93eed

              SHA512

              13cdadd8dd77269913455f468fac7021caf293985ee97f46ccd59b68c90274845b2334094d8a8715977dd02bb985ac093eadf5e4ada71ef910e617b8af6c3ea1

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              227KB

              MD5

              f3f1fa8f9a6be3fbe57a7eed4e86c878

              SHA1

              6e9d3e3e9351cbb8bcd62eb4cecb9b6f46f72332

              SHA256

              b83198c36ca494fcdb7ea2e0d50d030e996eaf2c9bd9d83e42019857184bb35b

              SHA512

              05a81749bd67e53dbffb6f4e30d3fc77d2178d3f524f4146182121a28ab3235d700c3f4b9a9a38db196903b891ba5f7bd67e7e999c8af4e9eafbaa90b6d71cf5

            • C:\Users\Admin\AppData\Local\Temp\is-G5E10.tmp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.tmp

              Filesize

              238KB

              MD5

              641e106cf89719c7f7be89c08a56490d

              SHA1

              33f4afd2953fff27e63953f5a9de4ec881a7718f

              SHA256

              e496894a063e3aa729355a09a91cf909e03ce4123360c64259d2433c46eeb1c5

              SHA512

              238d90a4a4e2b2e14afd89386bd066782e0719debb7f221a0fab8238e43c3f199dc7afbcbcd6fe45d1d50dd19287a27fad093f15bb67a0eee98f1a8288368363

            • C:\Users\Admin\AppData\Local\Temp\is-G5E10.tmp\5a2dc8e21f55ae24ffc96c3d17a4b501716077b44721a1aefa3c84677d487e12.tmp

              Filesize

              262KB

              MD5

              5c14f8d1d5b6176eb67615419b494f8f

              SHA1

              a6a9b5d2425ce20b4132a402ede82373ffad60c0

              SHA256

              2f8491e7eeb3ccbb9e849645d7d7b7fb5c795072a378b67acfdca44b01132b03

              SHA512

              3794dbca4bb785a696800d81d4d69314c523dad5aa0893307ebd872754a918dc772fb12ff90b7b9cff83e03dd2e166939b9b6506c695652286b0b3e0cc982b25

            • \Users\Admin\AppData\Local\Temp\is-B6MFQ.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-B6MFQ.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/3536-155-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3536-151-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3536-152-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3536-154-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3536-166-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4088-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4088-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4088-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4100-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4100-2-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4100-160-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4256-162-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-181-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-157-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-167-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-168-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-171-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-174-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-177-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-180-0x0000000000850000-0x00000000008F1000-memory.dmp

              Filesize

              644KB

            • memory/4256-159-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-184-0x0000000000850000-0x00000000008F1000-memory.dmp

              Filesize

              644KB

            • memory/4256-187-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-190-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-191-0x0000000000850000-0x00000000008F1000-memory.dmp

              Filesize

              644KB

            • memory/4256-194-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-197-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-200-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-204-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-207-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4256-210-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB