Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 01:14

General

  • Target

    cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe

  • Size

    6.9MB

  • MD5

    8eece2fdf3362a92c545f287cd2274d9

  • SHA1

    a3a915711509654a52b59d8c1a706c5801491ef3

  • SHA256

    cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54

  • SHA512

    99b94bc849a26357c9a87300a1a24ccb7c80f54dd05945c9efff7348f591d3c0946626fab275320561a1ee11df6f99418e06ca9cfb7db02039954760f504abe7

  • SSDEEP

    196608:/K2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:/DY6tiP3myRfzepXe4ny8gxzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe
    "C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp" /SL5="$9006C,6991381,54272,C:\Users\Admin\AppData\Local\Temp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4700
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4340
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
          PID:1632
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:3852
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 helpmsg 10
        1⤵
          PID:2044

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          153KB

          MD5

          f19ec6af5e531e4f963cb1e6fa4e80ab

          SHA1

          92d7a00f04614979b5998fd6406d20285bf28748

          SHA256

          ddaf5e19586c34b4c685374c4287369e0b425949a5de354b24c0b64d4861c5ea

          SHA512

          147b3d94771bbec84e8496e81f9cbfa45444d3be8f6d8d067c272592517a93bfa0dfc6e46792608fe97ab9bcc14067b59a37398acf51e17e007665c46e16969a

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          1KB

          MD5

          af52c69ad4da85b1cd6b249f998c0560

          SHA1

          b5805ce878124b7e3c4b84eb864daccc2bb2f5e2

          SHA256

          7c25b267ec34c4bf0cecb08dd9f06e4674d8f54c95eaa4edabc511b071a86b09

          SHA512

          0c0d757e0e07077cdcfc629e9070c72fd60d5c73f642290afa067e662938262ae2acc13a1d0222dc52d677ecd332f96389d4b28334c5a8b0795dd1d2e6a93aa7

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          98KB

          MD5

          c68fc7142703372ba4b981cc97d0faf1

          SHA1

          9c384fa178ec5f61805190c0b7f60dfe3f7272a0

          SHA256

          34313d73e352f3e450b53e37474eeba6addc362e24712d27b53e7902fe4ed7de

          SHA512

          b15f9dbfdf351f39c8143716715b4b221d0f3ffea81fee1017b50bc6b34faa3786182aec26aa9281e4784c8bd1be7e0228c3e35296489b211473e428f18834f5

        • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_iscrypt.dll

          Filesize

          1KB

          MD5

          30f56d3dcdbb4cee25cac7637364c580

          SHA1

          99fb8bc836254b3d273fde24225fdecbfbf58253

          SHA256

          24925300046609e14788b5a383ecbf2b11eeb555bc8b2f99ed0729cf904e0128

          SHA512

          183246d537305beb844dc9e9b62f400f7a565b38f014cf31962c373be5fff892b48dfeb59a552a15b94dee7d687c2bedcc3e283194a9e4244183e7bca1a1f121

        • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_isdecmp.dll

          Filesize

          1KB

          MD5

          db6184777f072d8f3d28804aa99da162

          SHA1

          b62f98de6ac12318bb03da9a5329dc7930a474b4

          SHA256

          04d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf

          SHA512

          f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7

        • C:\Users\Admin\AppData\Local\Temp\is-H0A1T.tmp\_isetup\_isdecmp.dll

          Filesize

          19KB

          MD5

          3adaa386b671c2df3bae5b39dc093008

          SHA1

          067cf95fbdb922d81db58432c46930f86d23dded

          SHA256

          71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

          SHA512

          bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

        • C:\Users\Admin\AppData\Local\Temp\is-JFLQG.tmp\cc3ba42acdecec71f1bada0572fe0add5ccfa01f6aae2c9773f514546eab5f54.tmp

          Filesize

          7KB

          MD5

          3e40cdb76e5fea3d235b7bf0d5424797

          SHA1

          dff1d3eda52bc62827e99638bd618c3e2272fc87

          SHA256

          d7394d3bc3d097b510859f97b831c556cc847e6049ce11994c22ccc416af07f5

          SHA512

          e6225f9bcd5ca4a2d8a06549c4b102f79648518ab33b605886d36f0fc86c5d1c4c0df36da211fc84ba31f00342c5f73c63f9e50eb14901443b4ba5ef0023c771

        • memory/1760-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1760-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1760-160-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4100-163-0x0000000000750000-0x0000000000751000-memory.dmp

          Filesize

          4KB

        • memory/4100-7-0x0000000000750000-0x0000000000751000-memory.dmp

          Filesize

          4KB

        • memory/4100-161-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/4340-179-0x00000000009B0000-0x0000000000A52000-memory.dmp

          Filesize

          648KB

        • memory/4340-167-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-210-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-207-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-158-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-162-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-159-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-204-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-168-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-197-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-171-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-174-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-177-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-200-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-184-0x00000000009B0000-0x0000000000A52000-memory.dmp

          Filesize

          648KB

        • memory/4340-183-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-187-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-190-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4340-191-0x00000000009B0000-0x0000000000A52000-memory.dmp

          Filesize

          648KB

        • memory/4340-194-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4700-165-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4700-151-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4700-152-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4700-155-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB

        • memory/4700-154-0x0000000000400000-0x000000000061C000-memory.dmp

          Filesize

          2.1MB