Analysis

  • max time kernel
    123s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 03:11

General

  • Target

    5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.exe

  • Size

    6.9MB

  • MD5

    2ad45a357c5b8db35971213d98bf4140

  • SHA1

    0e8b676ec2245946acf4600235c0f093d1e60088

  • SHA256

    5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36

  • SHA512

    87f9ac4bf909e6a19bf7312523dc0a99e63a16a93bfed64b252af2c54cbec0c24df2d6b716d6d3998284fe335aceb96e4fe67138b75abf22872a12eac723737f

  • SSDEEP

    196608:exnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:WNztzQlcDPXus98d9Jzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.exe
    "C:\Users\Admin\AppData\Local\Temp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\is-80GD0.tmp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-80GD0.tmp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.tmp" /SL5="$5021C,7025884,54272,C:\Users\Admin\AppData\Local\Temp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:924
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4120
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4488
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:704
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:5080

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              191KB

              MD5

              03d79c1413b24d9489b43184dc7da16d

              SHA1

              edb0622c134d478ed6b0e8b8d052a4c56d6da1e7

              SHA256

              48bb48ea3f9b31380e8500f69b08b2d9024714e92b35e3636117455b23a9e464

              SHA512

              4fb74b4935dcaa40a261db61000eab75bc618edf13e4d6bcbbdda4b157ce5c8b30750d3b7f9d9c1f7bcc0f2f3184101c26c7f610ad326933b20ae314be45b2e2

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              181KB

              MD5

              722448981eb35f8135c95c28892da3af

              SHA1

              a622bf9a33b27ba4f0b508f529f3dd497fd009c7

              SHA256

              2b4576fd2b6ff462e16c1c20de9ba887e61d0f6c4380e307e6aa42f530c61ed9

              SHA512

              e66e624a4692038777defcbd8a1e3ac3cadd06c18ad296c514a0ecfc7c7bc6ecaf59c239ff1f5f35b2473d17258a53ffec110423fe91667328be087e30735fc9

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              195KB

              MD5

              da3726357e4a3484265b57cea6d465fe

              SHA1

              3df4e009f2db5b8185de0b060b97dcb85182f5f5

              SHA256

              e947061e80cd2bd9e802f2b32bb878ceca4392619c51d3a50b6df646cd7d34e0

              SHA512

              7a0a892bdd523644e2704f39105f6339ad53883ce8dae80576f4b4bd79e2d6f0f8d746554c01438405b3d18a2b283c03394bcf4c7ba1f8327207def4a721a3eb

            • C:\Users\Admin\AppData\Local\Temp\is-80GD0.tmp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.tmp

              Filesize

              372KB

              MD5

              4288cf7faacf6c2400b0241db36ffff9

              SHA1

              989a77f359b9896d94ceb400507d2cd6b2ef0140

              SHA256

              ec0bb4a511a73060d050b6b64002cd35ad6abddadcc06e33a18a5e5bc18cc070

              SHA512

              e412324b32599fbd6b990055f9d08918ef4ef5dc3a68e4e12d285a50b794a970e498ee80e82ee341e2b06adf1a0b35f13c5703b9e866db7e6e4e46dba0c6e736

            • C:\Users\Admin\AppData\Local\Temp\is-80GD0.tmp\5fc316f34c032ab7ec9ff3384bd42c6b6c38a306a32637341a7589ddffad9b36.tmp

              Filesize

              389KB

              MD5

              f4ca82264bef269d77d205b9e18661a4

              SHA1

              fdba9a9ebae36adbe9164b7f45d0c62ac2bbc05f

              SHA256

              73aeee5b587c4584c5259a18d09fab49f0cf9cea2e0cb235922bb86a177b059c

              SHA512

              2427c008122a9fd0412d5e11bba23185918307ba2491c9cd99784d0e89a647df731c4b5601b0d40daf35cd992efbb144e6f4c88ad58f5e311eebc3bdd8212e52

            • \Users\Admin\AppData\Local\Temp\is-MASGJ.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-MASGJ.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/924-206-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-190-0x0000000000870000-0x0000000000912000-memory.dmp

              Filesize

              648KB

            • memory/924-199-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-159-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-158-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-186-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-196-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-209-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-193-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-202-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-162-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-189-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-164-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-167-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-170-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-173-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-176-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-182-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/924-177-0x0000000000870000-0x0000000000912000-memory.dmp

              Filesize

              648KB

            • memory/924-183-0x0000000000870000-0x0000000000912000-memory.dmp

              Filesize

              648KB

            • memory/4448-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4448-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4448-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4484-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4484-160-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4484-2-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4488-155-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/4488-151-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/4488-152-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB