Analysis

  • max time kernel
    1s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 01:14

General

  • Target

    cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe

  • Size

    6.9MB

  • MD5

    8eece2fdf3362a92c545f287cd2274d9

  • SHA1

    a3a915711509654a52b59d8c1a706c5801491ef3

  • SHA256

    cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54

  • SHA512

    99b94bc849a26357c9a87300a1a24ccb7c80f54dd05945c9efff7348f591d3c0946626fab275320561a1ee11df6f99418e06ca9cfb7db02039954760f504abe7

  • SSDEEP

    196608:/K2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:/DY6tiP3myRfzepXe4ny8gxzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe
    "C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp" /SL5="$9006C,6991381,54272,C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4700
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4340
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
          PID:1632
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:3852
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 helpmsg 10
        1⤵
          PID:2044

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\CRTGame\crtgame.exe

                Filesize

                153KB

                MD5

                f19ec6af5e531e4f963cb1e6fa4e80ab

                SHA1

                92d7a00f04614979b5998fd6406d20285bf28748

                SHA256

                ddaf5e19586c34b4c685374c4287369e0b425949a5de354b24c0b64d4861c5ea

                SHA512

                147b3d94771bbec84e8496e81f9cbfa45444d3be8f6d8d067c272592517a93bfa0dfc6e46792608fe97ab9bcc14067b59a37398acf51e17e007665c46e16969a

              • C:\Program Files (x86)\CRTGame\crtgame.exe

                Filesize

                1KB

                MD5

                af52c69ad4da85b1cd6b249f998c0560

                SHA1

                b5805ce878124b7e3c4b84eb864daccc2bb2f5e2

                SHA256

                7c25b267ec34c4bf0cecb08dd9f06e4674d8f54c95eaa4edabc511b071a86b09

                SHA512

                0c0d757e0e07077cdcfc629e9070c72fd60d5c73f642290afa067e662938262ae2acc13a1d0222dc52d677ecd332f96389d4b28334c5a8b0795dd1d2e6a93aa7

              • C:\Program Files (x86)\CRTGame\crtgame.exe

                Filesize

                98KB

                MD5

                c68fc7142703372ba4b981cc97d0faf1

                SHA1

                9c384fa178ec5f61805190c0b7f60dfe3f7272a0

                SHA256

                34313d73e352f3e450b53e37474eeba6addc362e24712d27b53e7902fe4ed7de

                SHA512

                b15f9dbfdf351f39c8143716715b4b221d0f3ffea81fee1017b50bc6b34faa3786182aec26aa9281e4784c8bd1be7e0228c3e35296489b211473e428f18834f5

              • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_iscrypt.dll

                Filesize

                1KB

                MD5

                30f56d3dcdbb4cee25cac7637364c580

                SHA1

                99fb8bc836254b3d273fde24225fdecbfbf58253

                SHA256

                24925300046609e14788b5a383ecbf2b11eeb555bc8b2f99ed0729cf904e0128

                SHA512

                183246d537305beb844dc9e9b62f400f7a565b38f014cf31962c373be5fff892b48dfeb59a552a15b94dee7d687c2bedcc3e283194a9e4244183e7bca1a1f121

              • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_isdecmp.dll

                Filesize

                1KB

                MD5

                db6184777f072d8f3d28804aa99da162

                SHA1

                b62f98de6ac12318bb03da9a5329dc7930a474b4

                SHA256

                04d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf

                SHA512

                f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7

              • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_isdecmp.dll

                Filesize

                19KB

                MD5

                3adaa386b671c2df3bae5b39dc093008

                SHA1

                067cf95fbdb922d81db58432c46930f86d23dded

                SHA256

                71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

                SHA512

                bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

              • C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp

                Filesize

                7KB

                MD5

                3e40cdb76e5fea3d235b7bf0d5424797

                SHA1

                dff1d3eda52bc62827e99638bd618c3e2272fc87

                SHA256

                d7394d3bc3d097b510859f97b831c556cc847e6049ce11994c22ccc416af07f5

                SHA512

                e6225f9bcd5ca4a2d8a06549c4b102f79648518ab33b605886d36f0fc86c5d1c4c0df36da211fc84ba31f00342c5f73c63f9e50eb14901443b4ba5ef0023c771

              • memory/1760-2-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/1760-0-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/1760-160-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/4100-163-0x0000000000750000-0x0000000000751000-memory.dmp

                Filesize

                4KB

              • memory/4100-7-0x0000000000750000-0x0000000000751000-memory.dmp

                Filesize

                4KB

              • memory/4100-161-0x0000000000400000-0x00000000004BC000-memory.dmp

                Filesize

                752KB

              • memory/4340-179-0x00000000009B0000-0x0000000000A52000-memory.dmp

                Filesize

                648KB

              • memory/4340-167-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-210-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-207-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-158-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-162-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-159-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-204-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-168-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-197-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-171-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-174-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-177-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-200-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-184-0x00000000009B0000-0x0000000000A52000-memory.dmp

                Filesize

                648KB

              • memory/4340-183-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-187-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-190-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4340-191-0x00000000009B0000-0x0000000000A52000-memory.dmp

                Filesize

                648KB

              • memory/4340-194-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4700-165-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4700-151-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4700-152-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4700-155-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB

              • memory/4700-154-0x0000000000400000-0x000000000061C000-memory.dmp

                Filesize

                2.1MB