Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2023 03:13

General

  • Target

    e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.exe

  • Size

    6.9MB

  • MD5

    6404ca3a9425da62f992b62898209824

  • SHA1

    7587c1062360bc9dbf8d19905a1b826ce669254d

  • SHA256

    e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b

  • SHA512

    d0ec590b69e776735c769b924d8b1f877c2c9184517b75243d3abb3519453caa2607ff23441c4ab4e60070c197fc3eabc372f156b673ebe8172c608e459b8a73

  • SSDEEP

    196608:qxnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:SNztzQlcDPXus98d9Jzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.exe
    "C:\Users\Admin\AppData\Local\Temp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\is-4BIU2.tmp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4BIU2.tmp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.tmp" /SL5="$50066,7025884,54272,C:\Users\Admin\AppData\Local\Temp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4684
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:1184
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2784
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4448
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:1784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        278KB

        MD5

        58a7da6c97ecb3388fd3aec03b560d9f

        SHA1

        ef52de3c2aec18ff477a82eda136313a9e190c8f

        SHA256

        28fc32a49be03932d0864be226e3886941d39062cb1f90a003efa2ef32cdc8e2

        SHA512

        b11ee9ef37efb58bbe8a404ce708cef1b5c329d0bb7278b7c61f6b1b7af13b12e5d4cf47e387f01650a7bf6e5b78c1309f4f7bddc1f8ae4cea36fa9715e386e4

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        72KB

        MD5

        fd4f17b2f7357884007d3f896ac4ec43

        SHA1

        9e7cf2051a15a451c0d3c408bae8bc8f95411b7a

        SHA256

        83ca8da49e546c0274581bcd40eb84293654b7cf7e04b4aa3087f33eabf01fb3

        SHA512

        d6471a41a6e5f800377cb7860e75bd4b52b3fb570b4d7c41aa0d6008e6dce8ef9040452a55e58a111d676f2e1f21537898f0ef856da3e3d4f53fce5f165ada34

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        35KB

        MD5

        098510dc8ad5eb3c8a885c0631546d80

        SHA1

        7a942dbfadb1e2c5ffe32cf0b5b107a052387794

        SHA256

        7be6ac86c17f4a8e3abe3a74908f6582ef562700a92464782ec485fbec32127a

        SHA512

        20d57b41bab6434ce6f84c2f1c0849cd0f7d3c4b6ad8e59dc20cd7d94e4c70715c53cb6eab2b3a7660716175aaba0aab55ea307cdb7e49c039c7abb4df7e6afd

      • C:\Users\Admin\AppData\Local\Temp\is-1S75F.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-1S75F.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-4BIU2.tmp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.tmp

        Filesize

        255KB

        MD5

        5dc29634830c98e01954ab83fd8aa652

        SHA1

        e872bb37ccbfee507b139dc995e400b49b8b2208

        SHA256

        b003e90ace6725eca284593d7e28dc87604ca5f05942572c5b1a3348695fd210

        SHA512

        5dd36f74401c7872c3ab18caa8e2d0cf5ea14244907a41fb92a2bc1c3331adf41c69fb27d83f5e38a3b64af3ec6be287464e663c2bd689843b9c0589bb8062d3

      • C:\Users\Admin\AppData\Local\Temp\is-4BIU2.tmp\e9d9fda0d4e9ce4e6e8165766ec3dd990b789826116c9ceeccbae9cf05b5737b.tmp

        Filesize

        149KB

        MD5

        dfe451f832e84558eb81c75c3e54f491

        SHA1

        d77c7e2198e7d57e928920b5fb7ae11ab23de8ed

        SHA256

        2923b317dfe81489e50f85eee44627439d2a88ccc484090efbffd2af8a8d7823

        SHA512

        2c38ea07df25cc37750d35bdf6507b9f3e9fb973991a6793c555c2b6de7520e2c604b35c52c9198e8687b985e40fea959e93901ca78d7f29a4d001df10e81335

      • memory/1184-186-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-190-0x0000000000880000-0x0000000000922000-memory.dmp

        Filesize

        648KB

      • memory/1184-209-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-158-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-159-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-206-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-203-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-199-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-196-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-193-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-189-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-162-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-181-0x0000000000880000-0x0000000000922000-memory.dmp

        Filesize

        648KB

      • memory/1184-166-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-167-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-170-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-173-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-176-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/1184-179-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/2908-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2908-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2908-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3448-163-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/3448-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3448-10-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/4684-152-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4684-151-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4684-154-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB

      • memory/4684-155-0x0000000000400000-0x000000000061E000-memory.dmp

        Filesize

        2.1MB