Analysis

  • max time kernel
    1s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 03:05

General

  • Target

    c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.exe

  • Size

    6.9MB

  • MD5

    4be8e48a5b75a393f79714ad65f14c7c

  • SHA1

    cf6c33244bf1e5111c17f9f6f499b936f958ca44

  • SHA256

    c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c

  • SHA512

    893121f12018e6974fd06ff742ad110dc7d659d4cbfe194727a21685cc991baa438f159a6af2f5916b60effa621529bfdea979c2f397d88da6b87434f41702ae

  • SSDEEP

    196608:LA89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:vBmakyVnlUQ7Wz3Tv1jNTh0zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.exe
    "C:\Users\Admin\AppData\Local\Temp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\is-M5R1R.tmp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-M5R1R.tmp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.tmp" /SL5="$5022A,6977575,54272,C:\Users\Admin\AppData\Local\Temp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:3460
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4740
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
          PID:2572
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:208
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 helpmsg 10
        1⤵
          PID:4800

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          121KB

          MD5

          03f7decfc1b52dbfe4ae8a9c95362d60

          SHA1

          01041f783633572d8c5e3c475346b0b9657fd49a

          SHA256

          c589d8db8e738312606d96339c55ee31cc9cfd9082309377f308b41cf17361a8

          SHA512

          f4e52ad43c2b9e71b4df1563fa60a28cf57d463a4cfd7b1ea5518f8e6c431c0b750f47d02d73f50bb01b8d4708fc2bab251ad145444753a92e3ade10649abf76

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          228KB

          MD5

          774d46d02b4077f2acc716e5033823b8

          SHA1

          547e5fd37b43544b9b4be66a20ef6c81cd469253

          SHA256

          32fb51e0adda0694861ade132c9dea82c383b606d8d51c777b69a2e6eb105334

          SHA512

          17520fc7d8165be21cfdbae0a6e0012cf53f2f42111334f421592eb901b3399600cde562961cbba538f5ca3af656b04bded3bde64ee7b5df45cc2c7954e03987

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          270KB

          MD5

          817ebfa0d1627e080a0641b5f651d5aa

          SHA1

          a56d0706ae121b43dc48eeba0f9de2412d438cc1

          SHA256

          723db1cd3692625fb7ded247d2623d7b29b97ef63019b5d2ad6a74e473f03e85

          SHA512

          4e409bf202e77bd01c8a4697cd5ea078900185b77d3cf8c4f4d5803dff1ccf9c5918873a173a4a339cb49db741fac9bf7f8da3a1362691bd6d59e8b91cf0a3a6

        • C:\Users\Admin\AppData\Local\Temp\is-M5R1R.tmp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.tmp

          Filesize

          140KB

          MD5

          468e428f5d39d5e230b9b6375fc46d56

          SHA1

          772537f0006dac96378cd2177ce243e0d17df89e

          SHA256

          cbfcde93e8ace2c3254ab8cd7164770d517b4ccde85d898b1093ce9308204497

          SHA512

          f0027cd0587619a77c46da6b1bfa845372f247cb8ba1a205d98ebd05109f519f4354508be024b6a28eb312226bc9c31f58d34b22360d2a506027ce11292bb095

        • C:\Users\Admin\AppData\Local\Temp\is-M5R1R.tmp\c7cfed56de662460cd2746fdc67b2dbb2d8606307b90fbb074314eefaf01e57c.tmp

          Filesize

          84KB

          MD5

          8d47815bfe6fc8db7d1c265189d2cda3

          SHA1

          dad5f3d405dcfedfd3bb0d9c8b777f75f4fce06c

          SHA256

          50d7f9dd264cde7f449ebff58f0c5f66ab2dce4626c3c6b948e71dd50aa48df6

          SHA512

          19fb864475b534024f1bd792eaff8985d36ba3bf2988a5860d134b37e6ce1ecc1e8ce10c9fb9603b8f8a7dcda7d45f148a27acb4ebe92c6e80f3fa2ff49715a7

        • \Users\Admin\AppData\Local\Temp\is-LE79M.tmp\_isetup\_iscrypt.dll

          Filesize

          2KB

          MD5

          a69559718ab506675e907fe49deb71e9

          SHA1

          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

          SHA256

          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

          SHA512

          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

        • \Users\Admin\AppData\Local\Temp\is-LE79M.tmp\_isetup\_isdecmp.dll

          Filesize

          19KB

          MD5

          3adaa386b671c2df3bae5b39dc093008

          SHA1

          067cf95fbdb922d81db58432c46930f86d23dded

          SHA256

          71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

          SHA512

          bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

        • memory/1368-7-0x00000000021F0000-0x00000000021F1000-memory.dmp

          Filesize

          4KB

        • memory/1368-163-0x00000000021F0000-0x00000000021F1000-memory.dmp

          Filesize

          4KB

        • memory/1368-161-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/3460-152-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/3460-155-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/3460-151-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-176-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-170-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-209-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-206-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-162-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-203-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-166-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-183-0x00000000007F0000-0x0000000000892000-memory.dmp

          Filesize

          648KB

        • memory/4740-177-0x00000000007F0000-0x0000000000892000-memory.dmp

          Filesize

          648KB

        • memory/4740-173-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-159-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-157-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-167-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-182-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-186-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-189-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-190-0x00000000007F0000-0x0000000000892000-memory.dmp

          Filesize

          648KB

        • memory/4740-193-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-196-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4740-199-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4820-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4820-160-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4820-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB