Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 03:19

General

  • Target

    73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.exe

  • Size

    6.9MB

  • MD5

    1d1be26f169d69aeaf124f294de185ce

  • SHA1

    e885eb1c0556fdda2dfa7ab195ff818a76069d53

  • SHA256

    73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff

  • SHA512

    5f4d36a974e43d6d4fdc7244b6391684f2c9656e370c35ab38d416b6309c0c29e65481997b8a818a0aa1987e377c71a945f781e374de403f0670a5f2137a769c

  • SSDEEP

    196608:qxnTNzjsOzc7TGHscDgcXbIdslX38dgFYJzj:SNztzQlcDPXus98d9Jzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.exe
    "C:\Users\Admin\AppData\Local\Temp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\AppData\Local\Temp\is-OPMB9.tmp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-OPMB9.tmp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.tmp" /SL5="$70206,7025884,54272,C:\Users\Admin\AppData\Local\Temp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2660
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:2868
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3900
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 10
            4⤵
              PID:3380

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              2.0MB

              MD5

              0bb99ecfdc9305663dcfe61e08270ac4

              SHA1

              197718e0ca4dd94e7c91ea6457418fb8b74fee96

              SHA256

              d30596d3d7c91624e8bc8c012f0393e947941ef3aa26481d2ea654c52caf726c

              SHA512

              f6f26c2ca6f33da6b069d7f0fa442446e33b4f9fac3965a1c5bcbb8346260438e04fd5ecf18820b75aa2c7f04fde3998a01a6102621f23aa5879c6bfa00a9e60

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              981KB

              MD5

              f4f5ce302f1be39ab65b44a28d6fab8e

              SHA1

              6ebd1a5acb7ac59a9cdd4ffb19a58e257c1c16fa

              SHA256

              1245badfac711a930bd8f3c43bb17f7618e3117e684df6a58a6f436f06c80605

              SHA512

              d669365619feaa287ad64c2ff4ff5537a3f34c9a9bf47f92232df2639ca65acf574e586d7d25d4e1afa5ad96c1d65d3cb382bede2290d90b221ca310e3d86f0d

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              778KB

              MD5

              c171dbd40adcd85ece60ad0ba8829568

              SHA1

              7078b4f6481ecf8f4f4e60875ba014aab9223baf

              SHA256

              ee2fe34b73d8cab3720eb2d97a03cb362ac99a97ce4ad95e7567ed8d5dbd43d0

              SHA512

              c16d14cdc2644a13731cd98cdb0ff5d5c2834a896ac95fa173f848ff303621593b04525ea5ff7564b70598a0f6a64d5c5349045d35a026c74b0386d63c95cc09

            • C:\Users\Admin\AppData\Local\Temp\is-OPMB9.tmp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.tmp

              Filesize

              366KB

              MD5

              7a966e54cb428919f4427dae556f0c3e

              SHA1

              8187e6e31b78030d48871f6d226087ec07d2ca00

              SHA256

              f52947a0e5ad9e1b84b3c0adabb5a736fd14349b12cdf937866d3d54722ccc0e

              SHA512

              61538fa700a8a037dc4154bc3627284315b170f2b887631f8bf6ca3884334dd02aef883fa74c4a7097fa73a0fad5d3a43c04e09a8f9ce971019a70ba0191b226

            • C:\Users\Admin\AppData\Local\Temp\is-OPMB9.tmp\73a351f639bc98d515b609480e4d6da2edd980b2d8a1dad2e86bfed0a38072ff.tmp

              Filesize

              229KB

              MD5

              c1d0e873968d212e3afb3af6757a3cf7

              SHA1

              786fc296b718effd1c1b736830649435eddb9edf

              SHA256

              61230250c20742d0c43074d0d6d763d1e24f0434748da9aaa3627c47bb863258

              SHA512

              5b38e4e7ff48c8b206ae142cca7310acbe0f7554d4a384afc9612ef57987598b1145cfbeac5ddbc7f8c3b2f65551a3c9c17b81d0e96f471b78d0f7c42a2e3486

            • \Users\Admin\AppData\Local\Temp\is-686EM.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-686EM.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/2868-153-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/2868-149-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/2868-151-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/2868-154-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3044-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3044-160-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/3044-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3900-192-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-181-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-158-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-161-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-208-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-165-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-166-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-169-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-172-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-182-0x0000000000960000-0x0000000000A02000-memory.dmp

              Filesize

              648KB

            • memory/3900-205-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-177-0x0000000000960000-0x0000000000A02000-memory.dmp

              Filesize

              648KB

            • memory/3900-175-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-185-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-188-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-189-0x0000000000960000-0x0000000000A02000-memory.dmp

              Filesize

              648KB

            • memory/3900-157-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-195-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-198-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/3900-202-0x0000000000400000-0x000000000061E000-memory.dmp

              Filesize

              2.1MB

            • memory/4608-159-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4608-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB