Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe
Resource
win10v2004-20231130-en
General
-
Target
aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe
-
Size
6.9MB
-
MD5
821b9a62966d60df2ea35c4929841114
-
SHA1
3cd8a93e41a09c4dcbf8c31dd3ceca3b37e05694
-
SHA256
aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403
-
SHA512
c5b4bfd8b89a393d84838a1c9541925deb22f26da5e82acaf38ea3ab9bbc9771f6c8a29e2ec5528477123381dd5cbd8a04c3c1d3bd71fcd5af5c672e90d94b35
-
SSDEEP
196608:GA89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:WBmakyVnlUQ7Wz3Tv1jNTh0zj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 2296 crtgame.exe 4504 crtgame.exe -
Loads dropped DLL 3 IoCs
pid Process 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\CRTGame\bin\x86\is-BEI20.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-KJSH1.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9GVP0.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-G03DB.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-D7ELH.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5N8RK.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-A62IE.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-GACUC.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-64KP5.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-V9A8H.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\is-VTCJP.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9QG7J.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-G8KIV.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-13NL1.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-OP3NC.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File opened for modification C:\Program Files (x86)\CRTGame\uninstall\unins000.dat aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\uninstall\unins000.dat aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-RKL1H.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-JUF0P.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-OENG3.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5L0OC.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-EKP10.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-3ULSH.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-M3B0S.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-CUI4F.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9M24S.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9JP41.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-AD73F.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-3I8M0.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-V51D7.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-RS0H2.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-VV4U2.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7BH76.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\lessmsi\is-6E5OS.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-K4HVR.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-S5AL4.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-CTLMA.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0BM0I.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-HQVCT.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-6UKCP.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QIEUG.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\uninstall\is-DT8M7.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-F2HVL.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-K7VV6.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-V5H2U.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File opened for modification C:\Program Files (x86)\CRTGame\crtgame.exe aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-GPLRI.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-QVT5D.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-A2UQT.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9UJKA.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-BKR8Q.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-V9OIR.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-R6MON.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-R9JTR.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-IJ6PC.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8TQ52.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-QTVGQ.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-T21P4.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-ACCEH.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-EV0HO.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-B7R30.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VCE2Q.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-NV10E.tmp aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4324 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3836 wrote to memory of 4024 3836 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe 24 PID 3836 wrote to memory of 4024 3836 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe 24 PID 3836 wrote to memory of 4024 3836 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe 24 PID 4024 wrote to memory of 468 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 44 PID 4024 wrote to memory of 468 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 44 PID 4024 wrote to memory of 468 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 44 PID 4024 wrote to memory of 2296 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 42 PID 4024 wrote to memory of 2296 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 42 PID 4024 wrote to memory of 2296 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 42 PID 4024 wrote to memory of 440 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 41 PID 4024 wrote to memory of 440 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 41 PID 4024 wrote to memory of 440 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 41 PID 4024 wrote to memory of 4504 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 40 PID 4024 wrote to memory of 4504 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 40 PID 4024 wrote to memory of 4504 4024 aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp 40 PID 440 wrote to memory of 1108 440 net.exe 39 PID 440 wrote to memory of 1108 440 net.exe 39 PID 440 wrote to memory of 1108 440 net.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe"C:\Users\Admin\AppData\Local\Temp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\is-35H9T.tmp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp"C:\Users\Admin\AppData\Local\Temp\is-35H9T.tmp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp" /SL5="$C0060,6977575,54272,C:\Users\Admin\AppData\Local\Temp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -s3⤵
- Executes dropped EXE
PID:4504
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 103⤵
- Suspicious use of WriteProcessMemory
PID:440
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -i3⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:468
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 101⤵PID:1108
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD599f434b277e09ebc29b2c5e2f4e05002
SHA1dc3cc0ae0a37a977081d101c224dda89497d7b43
SHA256f66df61998c8ac598e2e7931298a2ab12f6e791076c0195cfe1856e1d51e6214
SHA5129abd6881d20009054d596b889435a672881f7403220115c52509c04e237a96ce1dd6e8165d62ce75da5a59e183e9f3ba661e8258466b567008d86e2fb3a74105
-
Filesize
30KB
MD513e4d80bb9efc0fbb4f3e552d8a65940
SHA1fbca93f2038e73b84199e3b39312c47bd701840f
SHA25645e36dba7a9850aaf57f1c11700259af37d4edc8d1c087722fa5ffb6b8fd1120
SHA512a3a914b0e9955ba79d589a0cc1e9ae41a038a5b56da3e2b0b834c9d032c7023ab949ab13f08e97e6117685568f016096c5f3d43d2b4ab3b6eb547ff8c5a4b8e5
-
Filesize
75KB
MD597460e537060e36685cc704e499ad806
SHA12105299f5667a6f066f15ea7cce750b77d7ee762
SHA256d22710c19292a6e57a7f6e47dbccfc6621d780975e5a27624ec6302b51cbc4d2
SHA5124bda68511335b9fe352be32225d69d339c0d138892ed50b4dbea30593b1433689851af43e56134b81290379a5fb86b119469b09e30b84313deae8628ca5d5c82
-
Filesize
16KB
MD5bef087c12107fb16e19fe2fcb6b51a7f
SHA18d5ed23b104f770184c72f8a57962abb9ff0ef87
SHA256bc3fc7c5a64f25a0cd46fe7e4bf938add91f23d16f1b0d93122cdf83212a6ca1
SHA51296db203ee60eaf4020e0655d8375a31c75af86e7de14ebf465a508f314282599f8e31d3a2d9508d628490051a91a7e4f08c85b6722f1ef58c76a2835f5bcc1e1
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
C:\Users\Admin\AppData\Local\Temp\is-35H9T.tmp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp
Filesize481KB
MD532d75d253fa3c91a81cceb23c927a339
SHA1ea117c1a88b6d0f796fbabf533508e061ae5cfbc
SHA256a1dc2a2eb62f5466073d31ee20bd3b0b900d8ecadfdc15c83c7efb7a139619bc
SHA512b377e4bc1de52ccbd0764da2614488c74c99f57fa5cdeea07ff7e458fbb03be4b91a90d956c2e1cba89f3b49320aedc8ac67690a3129e76a3faa7146fc7cc4de
-
C:\Users\Admin\AppData\Local\Temp\is-35H9T.tmp\aa2f8d361939b155fad703f9c271e7ce83da7e9e5435d5991d46c5346357f403.tmp
Filesize252KB
MD5aedc03f4005e9f407385d121236b82ed
SHA1c1c1a5946922baf99485096200b2f7d61bcd55a5
SHA256af263c8edc29b47ec073edef13bfb6055eb8931dfdd6fd204102cae8c24e1dd3
SHA512864f92060f8444bb99bedc407ce3b6ea8af28ff138ed6089c8c229cd4fab5a47522e19d5933ca279c9ef1dd064e15fd38805c7d17b551a6f0fc1616a561bbdfe